Estimated reading time: 3 minutes
Cyber criminals in India are constantly evolving their tactics to exploit fear and trust. One alarming trend is the “Digital Arrest Scam,” where fraudsters impersonate law enforcement agencies or government officials to extort money or sensitive information. These scams...
Estimated reading time: 3 minutes
Phishing has drastically transformed from its early days as a simple scam targeting unwary email users. Modern phishing techniques—dubbed “Phishing 2.0″—are more complex, highly tailored, and designed to bypass even the most robust security systems. In this blog, we’ll...
Estimated reading time: 6 minutes
Fake CAPTCHA Lures Victims: Lumma Stealer Abuses Clipboard and PowerShell Introduction: We recently identified a new malware campaign using fake CAPTCHA pages to deliver Lumma Stealer, an infostealer operating under the malware-as-a-service (MaaS) model, first discovered in 2022. In...
Estimated reading time: 3 minutes
In today’s digital landscape, where cyber threats are evolving rapidly, organizations must rethink their approach to network security. Traditional security models, such as VPNs and perimeter-based defenses, are no longer sufficient to protect against sophisticated cyberattacks. This is where...
Estimated reading time: 8 minutes
Demystifying PKT and Monero Cryptocurrency deployed on MSSQL servers The world is rapidly transitioning into the digital age, reshaping how we communicate, work, and conduct financial transactions. This shift is driven by advancements in technology, increased internet accessibility, and...
Estimated reading time: 10 minutes
XELERA Ransomware Campaign: Fake Food Corporation of India Job Offers Targeting Tech Aspirants Table of Contents Introduction Initial Findings. Infection Chain. Technical Analysis. Initial Infection – Malicious Document. Second Stage – Malicious PyInstaller Executable. Final Stage – Malicious Python...