FelixRoot Backdoor Malware Resurfaced in a recent Campaign Felixroot Backdoor was first spotted in September 2017 in Ukraine spreading through pernicious banking documents with macros downloading the back […] Read more
Is implementing DMARC a cake walk or a tedious job? It is a cliché in IT industry for people to judge software or a protocol even before using it. Many […] Read more
FlawedAmmyy RAT being delivered via TA505 email spam campaigns Always be cautious while opening email attachments. Recently, hackers have been sending weaponized PDFs containing malicious SettingContent-ms files containing FlawedAmmyy […] Read more
Emotet Malware spreading extensively via Microsoft Documents in emails Hackers are trying to deliver Emotet malware by attaching it to Microsoft Office document via email. Many US citizens were […] Read more
Cloud Technology has brought in a paradigm shift in Storing Data Cloud Computing has flourished enormously over the past few years. It has changed the concept of data storage altogether. Every […] Read more
Indian BFSI Sector needs to be prepared for upcoming data protection laws The increase in financial crimes is not only a threat to BFSI (Banking, Financial Services and Insurance) companies but it […] Read more
What is DMARC? Why is it important for your business? What is DMARC? DMARC (Domain-based Message Authentication, Reporting and Conformance) is a technology advancement in preventing email and domain spoofing. […] Read more
Bypass glitch makes Mac OS vulnerable due to improper code-signing implementation A bypass found in third party developers’ interpretation of code signing API allowed for unsigned malicious code to appear to […] Read more
Beware of this Top 10 most misused Domains In the latest research it is revealed that, some of the latest TLDs (Top-Level Domains) such as .men, .work and […] Read more