Cyber Attack

The Rise of Phishing Attacks during the COVID-19 Pandemic

Cyberattacks are increasing in number every day due to the widespread use of mobile devices and the Internet. As data…

2 years ago

Importance of Biometrics in Cybersecurity

Introduction Cybersecurity refers to safeguarding the systems, networks, and applications against digital attacks intended to gain access to, alter, or…

2 years ago

Web Cache Poisoning DoS Attack

The Web Cache Poisoning DoS Attack, also known as CPDoS. It is a type of DoS attack that primarily relies…

2 years ago

Antivirus Evasion – Part 1

1. Antivirus – The Basics Antivirus software helps to protect against various computer infections by detecting malicious software, often referred…

3 years ago

Sweet32 Birthday Attack Approach

In this blog, we are going to understand one of the TLS/SSL attacks i.e., Sweet32 Birthday Attack Approach. Mostly Sweet32…

3 years ago

Json web token (JWT) Attack – Most Common Scenarios

What is a JSON web token (JWT)? A JSON web token (JWT) token is an open standard which defines the…

3 years ago

Security Advisory – Tecnimont Cyber Theft

Tecnimont Cyber Theft - Security Advisory   Background: Maire Tecnimont SpA is the parent company of the Italian group Maire…

5 years ago

Security Advisory – Saipem Cyber Attack by Shamoon Malware

Saipem Cyber Attack by Shamoon Malware 1. Introduction Saipem identified cyber-attack on Monday i.e. on 10th December 2018 that had…

5 years ago

Threat Advisory Report on Petya Ransomware (Critical Severity)

Threat Advisory Report on Petya Ransomware Attack (Critical Severity) Ransomware: An Introduction Ransomware is a form of malicious software that…

7 years ago

Buffer Overflow Attacks

Introduction to Buffer Overflow Buffer is a storage place in memory where data can be stored. It’s mostly bound in…

7 years ago