Balaji

Balaji

Copyright and Data Security in Digital ArchivesCopyright and Data Security in Digital Archives

Copyright and Data Security in Digital Archives

Data is one of the most valuable assets in the modern world. It informs business decisions, helps diagnose illnesses, and…

2 years ago
10 Most Secure Messaging Apps 202410 Most Secure Messaging Apps 2024

10 Most Secure Messaging Apps 2024

Private conversations are the most sensitive digital data and Secure Messaging Apps play a major role in privacy. We all…

2 years ago
Ransomware Attack Response and Mitigation ChecklistRansomware Attack Response and Mitigation Checklist

Ransomware Attack Response and Mitigation Checklist

Ransomware is one of the fast-growing threats worldwide and it's considered as a leader of the Global cyberattack in recent…

2 years ago
Andariel APT Hackers Drop a New Malware On Windows Via Weaponized MS Word DocAndariel APT Hackers Drop a New Malware On Windows Via Weaponized MS Word Doc

Andariel APT Hackers Drop a New Malware On Windows Via Weaponized MS Word Doc

The latest research discovered Andariel, a part of the Lazarus group, introduced several new malware families, such as YamaBot and…

2 years ago
Beware! Mallox Ransomware Attacks IT Industries With a New Attack PatternBeware! Mallox Ransomware Attacks IT Industries With a New Attack Pattern

Beware! Mallox Ransomware Attacks IT Industries With a New Attack Pattern

A new variant of Mallox ransomware, also known as “Target company” ransomware, adopts a unique method of appending the name…

2 years ago
AndroRAT – A Remote Access Trojan Compromise Android Devices and Inject Root ExploitsAndroRAT – A Remote Access Trojan Compromise Android Devices and Inject Root Exploits

AndroRAT – A Remote Access Trojan Compromise Android Devices and Inject Root Exploits

A Newly discovered Android Remote Access Trojan called AndroRAT targets unpatched Android Devices that exploit the publicly disclosed critical privilege escalation…

2 years ago
Bypassing and Disabling SSL Pinning on Android to Perform Man-in-the-Middle AttackBypassing and Disabling SSL Pinning on Android to Perform Man-in-the-Middle Attack

Bypassing and Disabling SSL Pinning on Android to Perform Man-in-the-Middle Attack

Certificate Pinning is an extra layer of security to achieve protection against man-in-the-middle. It ensures only certified Certificate Authorities (CA)…

2 years ago
Microsoft Teams Vulnerability Let Attackers Deliver Malware From External AccountsMicrosoft Teams Vulnerability Let Attackers Deliver Malware From External Accounts

Microsoft Teams Vulnerability Let Attackers Deliver Malware From External Accounts

The latest version of Microsoft Teams had a security flaw uncovered recently by Max Corbridge (@CorbridgeMax) and Tom Ellson (@tde_sec),…

2 years ago
Masscan – World’s Fastest Scanner – Scan the Entire Internet in Under 6 MinutesMasscan – World’s Fastest Scanner – Scan the Entire Internet in Under 6 Minutes

Masscan – World’s Fastest Scanner – Scan the Entire Internet in Under 6 Minutes

Masscan - Worlds fastest scanner can scan the entire Internet in under 6 minutes, transmitting 10 million packets per second. …

2 years ago
Authorities Shut down the Worlds Largest Darknet Child Sex Website That Contains 250,000 Unique VideosAuthorities Shut down the Worlds Largest Darknet Child Sex Website That Contains 250,000 Unique Videos

Authorities Shut down the Worlds Largest Darknet Child Sex Website That Contains 250,000 Unique Videos

“Welcome to Video”, the world's largest child sexual exploitation darknet website has been seized and the operator (Jong Woo Son,…

2 years ago