# Tags

5th January and The Tale of Joshi Virus: India’s First Global Computer Virus

In the cinematic tapestry of cybersecurity, where tales of intrigue and innovation collide, one story emerges from the shadows of the past. It’s a story that began in the early 1990s, during the DOS era, when computer viruses were still a novel and mysterious menace. This is the tale of Joshi, a virus of Indian […]

Protect your children from financial frauds when gaming

Staying safe while gaming: how to ensure your children don’t become victims of financial fraud

If you’re a parent and haven’t been in touch with gaming for a while, you’d be surprised at how much it has changed. Gaming is no longer the single-user experience that you may remember from the 1990s or the early 2000s. Today’s games are full-blown experiences centred around communities that see players participating in the […]

cryptocurrency

Blockchain & Fraud Prevention: Strategies to overcome the cryptocurrency scam

Cryptocurrency has revolutionized financial transactions, offering speed, anonymity, and decentralization. However, the rise of cryptoscams has become a significant concern for investors and users alike. As the popularity of digital currencies grows, so do the sophisticated trading scams that exploit vulnerabilities in the system. In this blog, we’ll explore how blockchain crypto technology can be […]

Sextortion Scam

Sextortion Scam: Blackmail scam emails that demand Bitcoin

Sextortion scam emails have become a disturbingly common occurrence in people’s inboxes. These menacing messages claim the sender has hacked your computer, recorded you visiting adult websites or engaging in compromising acts via your webcam, and will share the embarrassing video with all your contacts unless you pay a ransom in Bitcoin. But here’s the […]

Beware: Fake Apps posing as Open AI’s ChatGPT App

Beware!  Behind the face of advancing technology lies a dark underbelly – that of evolving cyber crime. Here, perpetrators continually adapt their strategies, exploiting current events, government websites, and even trusted organizations’ legitimate applications to deceive users. This sophisticated approach involves the use of trusted names and logos to entice individuals into downloading fake apps […]

THREAT ADVISORY: Zero-Day Vulnerabilities Detected on WinRAR

Zero-day vulnerabilities represent an imminent threat to cybersecurity, and in this case, two such vulnerabilities, CVE-2023-38831 and CVE-2023-40477, have been identified in the widely utilized WinRAR software. These vulnerabilities pose a grave concern due to their potential for remote code execution, presenting a severe threat risk.  WinRAR is a popular compression tool with half a […]

Mallox Ransomware Strikes Unsecured MSSQL Servers

Introduction: First observed in the middle of 2021, ‘Mallox’ Ransomware has emerged as a formidable threat in the cyber crime landscape. With its ability to encrypt all volumes, including local and network shared drives, it gradually spreads its control over the system, leaving victims in a state of digital despair. Mallox Ransomware uses the “.mallox” […]

THE PERILS OF RANSOMWARE : How to Save yourself from the next attack

In recent years, ransomware attacks have increased in frequency and sophistication, resulting in substantial impact across numerous industries and sectors worldwide. A typical ransomware attack encrypts computer systems, and blocks access to the user’s or company’s own data, and a ransom is demanded as payment in exchange of its release. In this blog, we will […]

Expiro: Old Virus Poses a New Challenge

A recent virus infection faced by some users was swiftly detected as being caused by Expiro. We have conducted an in-depth investigation and analysis on the intricacies of Expiro and what makes it such a potent threat. This article lays out our analysis and understanding of the matter from our Security Research Lab and offers […]

Your Office Document is at Risk – XLL, A New Attack Vector

  Microsoft Office documents are used worldwide by both corporates and home-users alike.  It’s different office versions, whether licensed or unlicensed offers users an easy way to create and modify files. However, this software is also susceptible to cyberattacks. Cybercriminals often take advantage of its vulnerability and use VBA (Visual Basic Application) macros as entry […]