Got infected by the Maze ransomware? To pay or not to pay the ransom? Is this the ultimate decision in ransomware attacks? Not anymore. Cyber-criminals have found a new way to leverage the exploitation of victims who do not agree to pay the ransom.
Since most of the users…
What to do when you receive an extortion email
June 19, 2020
The extortion email is not a new concept, but the frequency is increasing in the current lockdown scenario. As a result, everyone is alarmed. This means that cybercriminals send emails demanding payments. In case of a refusal, they threaten the users to make their sensitive…
Ransomware Gang Launches Website to Auction Stolen Data
June 18, 2020
The Sondinokini Ransomware Gang has gone an extra step ahead and launched an auction stolen data website. The gang is accused of attacking UK Powergrid Middleman Elexon and has recently launched an eBay auction site to sell data of the victim that denied paying the…
Tech support scams are another avenue that cyber-criminals are approaching to gain profit. It majorly targets fooling users into paying for fixing technical issues in their computer system. Tech support scammers make you believe that you have serious PC issues that cannot be…
Beware of Wiper Malware! How to stay protected.
June 16, 2020
The destructive nature of Wiper Malware differentiates it from the other members of the family. Rather than aiming at ransom, the working methodology of this malicious malware involves deleting, wiping, or overwriting user data and information.
The motivation behind…
GandCrab ransomware belongs to the family of Ransomware and keeps coming back in a refined version. First discovered in January 2018 it works on RaaS (Ransomware-as-a-Service) and holds a market share of approximately 40%.
To date, its developers have released 5 different…
A Brute Force Attack is a cryptographic hack that is based on a password cracking method. It works on a hit and trial methodology which uses all possible combinations of username and password until the correct combination is discovered.
For strong and long passwords…
The WannaCry cryptoworm belongs to the family of ransomware and is known to be one of the ‘deadliest’ ones that we have seen in the past few decades. Have you come across such a warning message on your device? “Oops, your important files are locked”. If…
Top 5 most dangerous cyber-attacks
June 11, 2020
Over the last few decades, dangerous cyber-attacks have gained a lot of attention and have become a major area of concern for this technology-driven era. The underlying aim of a cyber attack can range between data theft to ransom attack, impersonation, cyber espionage…
What is an Insider Threat? Signs and Prevention
June 9, 2020
An Insider Threat takes place when someone from within the organization or close to it uses its sensitive information in a wrong manner. The person exploiting the information can either be a former employee, board member, business partner, a current employee who has access…