by Habshan AK | Nov 25, 2017 | Malware
CrowdStrike Falcon Search Engine is a malware search engine developed by CrowdStrike, based on their arguably largest threat database which receives 51 billion security events every day from its install base and with 700 million files indexed, to make a total of 560...
by Renjith Gopalakrishnan | Sep 30, 2017 | Social Engineering, Vulnerability Assessment and Penetration Testing
Social Engineering – Attack Vectors Phishing The target/victim is manipulated with the appearance possessed by the attacker that he/she represents a legitimate source. The victim receives emails from the fraudulent but appeared to be a prominent source with the...
by Noel Mathew | Sep 24, 2017 | Android, Smart Phone, Vulnerability Assessment and Penetration Testing
Mobile Applications have become an essential part of our lives as our dependence on smartphones has grown. But many users are unaware of the security of their devices. A recent study on the state of application security that “84 percent of mobile app users...
by Renjith Gopalakrishnan | Sep 23, 2017 | Social Engineering, Vulnerability Assessment and Penetration Testing
Social Engineering – Attack Cycle Reconnaissance Attack vectors are determined by the information gathered. Information from the target/victim can be inferred and assembled in various ways that include potential and probable passwords, catalog and distinguish...
by Noel Mathew | Aug 26, 2017 | Cyber Attacks, Malware
Researchers from the University of Washington say they have successfully hacked into a computer using custom strands of DNA for the first time. The researchers used the life-encoding molecule to attack and take over a computer, using strands of DNA to transmit a...
by Mufeed Ubaid | Aug 25, 2017 | Cyber Attacks, Cyber Security, Malware, Ransomware
Mamba – The Disk Encrypting Ransomware Last November of 2016, the Mamba ransomware was first detected in public attacks against the San Francisco Municipal Transportation Agency, encrypting the hard drives, leaving its internal computer and payment systems on halt....
by Noel Mathew | Aug 25, 2017 | SOC
What is PCI DSS The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal...
by Tijo Davis | Aug 24, 2017 | Malware, Petya / NotPetya, Ransomware, Wannacry
In May 2017, malware outbreak such as WannaCry and Petya / NotPetya infected both enterprises and individuals across the globe. All data on the infected system were encrypted and the demanded ransom was $300 for the decryption key. Within a day, this outbreak was...
by Arun Thomas | Aug 20, 2017 | Cyber Security, SIEM, SOC
In the current era of security threat attacks and cyber warfare, it comes as a vital need to persistently monitor and scrutinize the ongoing threats and day-to-day malicious activities. An essential component of threat intelligence analysis at any level is the...
by Arun Thomas | Aug 19, 2017 | Cyber Security, SIEM, SOC
Planning for the effective Log Monitoring Effective planning of log-monitoring activities starts with a thorough understanding of organization legal, regulatory, business, and operational requirements. The technical capabilities of the organization systems should be...
Recent Comments