#Cybersecurity #Malware #Uncategorized CetaRAT APT Group – Targeting the Government Agencies CetaRAT was seen for the first time in the Operation SideCopy APT. Now it is continuously expanding its activity since Prashant Tilekar / 4 years Comment (0) (66)
#Cybersecurity #Phishing #Uncategorized What is Phishing? A Deep Dive into the Phishing Attack Mechanisms with Tips Phishing is a technique used to steal credentials, personal information & financial details of a user. The attacker sends email Amruta Wagh / 4 years Comment (0) (169)
#Blockchain #Cryptojacking #Cybersecurity Blockchain & Fraud Prevention: Strategies to overcome the cryptocurrency scam What is Cryptocurrency? Cryptocurrency is a type of digital currency that generally only exists electronically. There is no physical coin Vijay Yadav / 4 years Comment (0) (487)
#Cybersecurity #Phishing #Scams Sextortion Scam: Blackmail scam emails that demand Bitcoin What is Sextortion? Sextortion is a scam via email or any other medium to blackmail the victim and threaten to Ayush Puri / 4 years Comment (0) (665)
#Cybersecurity #Phishing #Uncategorized Scam Alert: Covid-19 Vaccine Phishing and Money Scam Hits India As the COVID-19 vaccination drive kicks off in India, phishing scammers are looking to cash in on people’s quest to Amruta Wagh / 4 years Comment (0) (89)
#Cybersecurity #Scams #Tech 7 out of 10 Indians Have Encountered Tech-Support Scams in Past 12 Months Microsoft today released findings of its 2021 Global Tech Support Scam Research report that looks at tech support scams and Jatin Sharma / 4 years Comment (0) (113)
#Cybersecurity #Uncategorized Moving to the cloud? Learn how to manage your cyber risks on the journey to cloud transformation Cloud adoption has witnessed exponential growth over the past few years. However, it brings forth a new set of cyber Srinath Vangari / 4 years Comment (0) (44)
#Cybersecurity #Ransomware Mitigating Ransomware Attacks: How to keep you and your family safe There’s a rise in ransomware attacks, and they’re becoming deadlier and more dangerous than ever! A report by Cybersecurity Ventures predicted Quickheal / 4 years Comment (0) (38)
#Cybersecurity #Phishing #Uncategorized FormBook Malware Returns: New Variant Uses Steganography and In-Memory Loading of multiple stages to steal data Quick Heal Security Lab has seen a sudden increase in dotnet samples which are using steganography. Initially, in the static Rumana Siddiqui / 5 years Comment (0) (94)
#Cybersecurity #Malware WARZONE RAT – Beware Of The Trojan Malware Stealing Data Triggering From Various Office Documents Warzone RAT is part of an APT campaign named “Confucius.” Confucius APT is known to target government sectors of China Ayush Puri / 5 years Comment (0) (89)