Estimated reading time: 4 minutes
In the wild, malspam campaigns are a major medium to spread malware. Previously, we have written about such campaigns using MS Office files with malicious macro and using vulnerabilities. Recently, we observed a spam campaign that uses .url files...Information Technology, Network Security & Cybersecurity Updates
Estimated reading time: 2 minutes
A big headache which all network administrators have is the vulnerability status of their business. With more and more business being conducted online, every organization has an online presence and network. Popular software attracts the attention of malicious criminals...Estimated reading time: 3 minutes
SMBs are increasingly evaluating security vendors on the basis of their endpoint encryption services and other related features. While managed security services are mostly outsourced, a better part of an organization’s security posture depends on how the endpoints are...Estimated reading time: 3 minutes
While the existing crypto-sphere is already plagued by issues concerning scalability, financial privacy is fast shaping us yet another prerequisite to sizeable investments. Individuals are constantly emphasizing on anonymous cryptocurrencies courtesy the flexibilities on offer. That said, we believe...Estimated reading time: 4 minutes
Cryptocurrencies are all the vogue now. This has resulted in the emergence of increasing cryptocurrency mining activities. Several platforms make mining services available to users. One such platform that provides JavaScript cryptocurrency miners for websites is CoinHive. Recently, we have...Estimated reading time: 4 minutes
Apache Struts is an open-source CMS based on MVC framework for developing Java EE Web Applications. Apache Struts has been widely used by many Fortune 100 companies and government agencies over the years for developing web applications. But, websites built using a CMS constantly need to...