Got infected by the Maze ransomware? To pay or not to pay the ransom? Is this the ultimate decision in…
The extortion email is not a new concept, but the frequency is increasing in the current lockdown scenario. As a…
The Sondinokini Ransomware Gang has gone an extra step ahead and launched an auction stolen data website. The gang is…
Tech support scams are another avenue that cyber-criminals are approaching to gain profit. It majorly targets fooling users into paying…
The destructive nature of Wiper Malware differentiates it from the other members of the family. Rather than aiming at ransom,…
GandCrab ransomware belongs to the family of Ransomware and keeps coming back in a refined version. First discovered in January…
A Brute Force Attack is a cryptographic hack that is based on a password cracking method. It works on a…
The WannaCry cryptoworm belongs to the family of ransomware and is known to be one of the 'deadliest' ones that…
Over the last few decades, dangerous cyber-attacks have gained a lot of attention and have become a major area of…
An Insider Threat takes place when someone from within the organization or close to it uses its sensitive information in…