Data Breach – Understanding the severity of it

Credit to Author: Akuti Ojah| Date: Wed, 15 Jul 2020 12:45:04 +0000

A data breach is a security gap in which information or data is accessed or stolen without authorization. It is a breach of trust between the owner of the data and the party that accesses it without consent. To put it in simpler terms it a nonconsensual usage of someone’s…

Read more

Poulight- An info-stealing trojan might be teaching you how to play Minecraft

Credit to Author: Akshay Gaikwad| Date: Mon, 22 Jun 2020 12:30:19 +0000

Poulight is an info-stealer trojan which most probably originated in Russia. It is written in the .NET and can collect sensitive information and deliver it to cybercriminals. Ever since its first appearance, it has been growing substantially and taking different forms. The main Infection vector remains spear-phishing emails. It was…

Read more

Way Out of The MAZE: A Quick Guide For Defending Against Maze Ransomware

Credit to Author: Jayesh kulkarni| Date: Thu, 23 Apr 2020 09:18:21 +0000

From late 2019, MAZE Ransomware started becoming infamous for its Encryption, data stealing and the subsequent selling of the stolen data. Few other reasons behind its popularity are also its unique targets and the ransom demands. From its inception around May 2019, MAZE actors are targeting multiple sectors, prominent ones…

Read more

Ako Ransomware targeting businesses using RaaS

Credit to Author: Shriram Munde| Date: Fri, 24 Jan 2020 11:00:51 +0000

Ako Ransomware targeting businesses using RaaS Quick Heal security researchers recently observed ransomware that uses RaaS (Ransomware as a Service) which is a subpart of MaaS (Malware as a Service). Before delving into the AKO ransomware or RaaS, one must understand what Malware as a Service means, as it is…

Read more

What you need to know about new data-security rules for business travel

Credit to Author: Mike Elgan| Date: Fri, 15 Nov 2019 07:39:00 -0800

From U.S. Customs agents to cybercriminals, everyone wants to copy the data on your phone and laptop. Here’s how to protect your rights and also avoid industrial espionage.

Read more