VALENTINES DAY GIFT BY SODINOKIBI RANSOMWARE HACKERS
Well known extortionist group Sodinokibi on 2020 Valentine, released data of the GEDIA automobile company in a well known forum. Since their last release of the data for the sameRead More →
Cyber Security Researcher. Information security specialist, currently working as risk infrastructure specialist & investigator. He is a cyber-security researcher with over 25 years of experience. He has served with the Intelligence Agency as a Senior Intelligence Officer. He has also worked with Google and Citrix in development of cyber security solutions. He has aided the government and many federal agencies in thwarting many cyber crimes. He has been writing for us in his free time since last 5 years.
Well known extortionist group Sodinokibi on 2020 Valentine, released data of the GEDIA automobile company in a well known forum. Since their last release of the data for the sameRead More →
Technology upgrade is most common factor to complete daily tasks in minimal time. Most up gradation is done to secure internal/ external networks. We usually find QR codes everywhere. FromRead More →
“Cybercriminals will steal an estimated 33 billion records in 2023. That’s according to a 2018 study from Juniper Research. The compares with 12 billion records Juniper expects to be swipedRead More →
In today’s modern economy, a smaller, more nimble company can compete with larger businesses. They can not only compete, but sometimes overtake those bigger, slower, less advanced companies. The reasonRead More →
Facebook has now become most common platform for many users. With facebook you can do much more then making friends. You can also promote your business on facebook by creatingRead More →
One of the main goals of artificial intelligence (AI) is to replicate the way the human brain thinks. For decades, computer scientists have worked on improving AI systems, and inRead More →
While doing penetration testing there are many ways to gather information. There are many tools which are used in scanning, reconnaissance for knowing the loophole. Tools of Kali Linux whichRead More →
What Is an SSL Certificate? SSL is Secure Sockets Layer but what does this actually mean? In its simplest terms it is the method by which information is protected whenRead More →
The attackers behind the Sodinokibi Ransomware finally published data stolen from another victim as they failed to pay ransom. Sodinokibi claims that this data was stolen from GEDIA car partRead More →
Email addresses, spammer loves these. Emails is the main source of authentication for most social media platforms. On daily basis, fake social media accounts are used by various cyber criminal.Read More →
There comes a time when the IT infrastructure of a company grows at an undisputed rate. New users are added to the network frequently, which in turn creates new ITRead More →
Telegram, the another most popular instant messaging application after WhatsApp. Telegram is mainly popular because of its privacy features. Telegram has gain popularity because of its privacy policies. As companyRead More →
The era of online shopping is in full swing. Now, more than ever, people are altering their shopping habits to be conducted almost completely online. Anything you need can beRead More →
Using Social Media platforms in Cyber Criminal activity is very common from last decade. Creating fake profiles with same name, details and it looks same replica of the original. FacebookRead More →
Web browser extensions gives additional features to any normal web browser. Extensions are capable of giving functionality from capturing web pages to downloading videos from restricted websites. Most web browserRead More →
Traditionally, UI/UX and security were two aspects that were taught separately when it came to application design. Thinking about it now, it wouldn’t make much sense, really. A concrete securityRead More →
Whether you’re in charge of a large corporation, or you’re just getting your feet wet with a brand new start-up, data theft and threats to your company’s productivity are anRead More →
Metasploit can used in various ways for exploiting Windows vulnerabilities. Metasploit, most popular framework for pentester/ security researcher, is capable for attacking any Windows operating system platform. Metasploit gives multipleRead More →
Shutterstock The more sensitive data you have online, the higher the risk of losing not only them but also your digital identity. You may ask, does someone collect data aboutRead More →
There are numerous way in which web applications can be infected and everyday backdoor news can be seen in headlines. Shell backdoor is another form malware script which are usedRead More →