Detect and Prevent Fraud, Data Leaks and Advanced Internal as well as External Attack for Cyber Infrastructure with Security Orchestration, Automation and Response
SONAR.Miner!gen3 is a stealthy and sneaky malware that belongs to the Trojan community. This dangerous PC threat can easily access your windows computer without permission and leads to major damage....[ read more ]
Cybercriminals managed to develop a crypto mining malware that has compromised more than 40,000 machines and 9000 companies around the world. This malware was uncovered by Gurardicore labs team. Prowli...[ read more ]
In a recent development, Pedro Ribeiro a security researcher has reported about vulnerabilities collectively tracked as CVE-2018-1418. These vulnerabilities found in IBM QRadar, allows hackers to bypass authentication and deploy...[ read more ]
In the latest discovery, it was found that the organization iCoreX responsible for creating Anabelle and JigSaw Ransomware has developed a RedEye Ransomware. This Ransomware spread via spam mail and...[ read more ]
The Blood Ransomware virus infects your device without any single hint and encrypts all your system data. Blood Ransomware use AES and RAS ciphers to lock down your files. There...[ read more ]
Imperva research report shows, out of four Redis Servers three are infected with malware. Redis, or REmote DIctionary Server, is an open source, widely popular data structure tool that can...[ read more ]
SynAck is not new, it has been known since September 2017, but in a recent discovery, sample caught our attention after it was found to be using Process Doppelgänging. The...[ read more ]
BackSwap Malware is a newly discovered banking Trojan. This malware has an innovative technique to identify user accessed banking websites and injects malicious code into the targeted web pages. On...[ read more ]
Trojan.Scarimson is a trojan horse that opens a backdoor on the compromised computer. It steals information and downloads potentially malicious files. “Trojan.Scarimson!gm is a heuristic detection used to detect threats...[ read more ]
Kaspersky Lab security researchers have discovered four serious vulnerabilities in D-Link DIR-620 wireless router firmware, that can provide access to attackers from anywhere from the world. These vulnerabilities originally identified...[ read more ]