The evolution of a 4-year-old-threat Emotet: From an infamous Trojan to a complex threat distributer

Credit to Author: Aniruddha Dolas| Date: Wed, 25 Jul 2018 13:40:33 +0000

Emotet malware campaign has been existing for a long time. It comes frequently in intervals with different techniques and variants to deliver malware on a victim. Attackers are smart and they use complex techniques to avoid detection. At the start of 2017, we had seen the emotet campaign spreading through…

Read more

3 common types of phishing attacks and tips to avoid them

Credit to Author: Rajiv Singha| Date: Tue, 26 Jun 2018 10:51:01 +0000

Phishing is one of the oldest tricks in the book of hackers. But as old as it might be, phishing still remains the most lucrative tool for cybercriminals; as they say, old is gold. This post tells you about the 3 common types of phishing attacks and tips to avoid…

Read more