A complete guide to Cyber Threat Hunting
What is threat hunting? Threat hunting, also known as cyberthreat hunting, is a proactive method for detecting previously undisclosed or continuing cyberthreats in an organization’s network. Significance of threat hunting:- How does the cyber threat hunting works? Cyberthreat hunters are experienced cybersecurity specialists. They are typically security analysts within a company’s IT department who are intimately familiar with the organization’s operations, but they can also be independent analysts. Threat hunting teams employ security automation to assist…
Read morePOSTED BY
shripali
The terror of Bad Rabbit Ransomware
Bad Rabbit is defined as the ransomware strain that is spread via hacked websites, infected system via a fake adobe installer and held encrypted files for bitcoin. What is Bad Rabbit Ransomware:- The creators:- As of right now, no threat group has been identified as responsible for the Bad Rabbit ransomware. Nonetheless, the drive-by attack’s…
Read morePOSTED BY
shripali
Things to know about History’s most destructive ransomware NotPetya
NotPetya is a new ransomware that resembles in many aspects with its predecessor Petya. It was released in 2017, 28th June. Almost similar, yet different, NotPetya has some noticeable differences. It affected more than 2000 organizations. It was mainly targeted to Ukraine. Like Petya, NotPetya also encrypts whole hard disk instead of MFT(master file table).…
Read morePOSTED BY
shripali
The most unusual cyber attack:-Petya Ransomware Attack
What is Petya Ransomware A kind of very malicious spyware known as Petya ransomware prevents users from accessing computer systems until they pay a ransom. Petya targets Microsoft Windows operating systems to encrypt the Master Boot Record (MBR) and Master File Table (MFT), preventing machines from booting up, unlike other ransomware that encrypts individual files…
Read morePOSTED BY
shripali
Case study of the famous WannaCry Ransomware
About WannaCry:- WannaCry attack is one of the remarkable strike in the history of the cybercrime that shook the digital world to the core. It was the major security incident that affected the organisations all over the globe. When happened:- On the May 12, 2017, the outbreak of this ransomware worms take hold of more…
Read morePOSTED BY
shripali
The SONY.SAMBANDH.com scam: Nation’s first ever cyber convicted case
When it took place? This case took place about a decade ago, back in 2013. It was the time when India faced its first ever cyber conviction. Case filed by:- It all begins when Sony India filed a complaint against Arif Azim. Arif was a resident of Noida, U.P. Company’s Profile:- Sony.Sambandh was a newly…
Read morePOSTED BY
shripali
The in-depth analysis of knocking down of Hive ransomware
When the news was broken The Justice Department revealed in January 2023 that it has carried out a months-long operation to disrupt the Hive ransomware group, which has attacked over 1,500 victims across more than 80 countries, including hospitals, school systems, financial institutions, and vital infrastructure. The initiation of the mission:- Since then, the FBI…
Read morePOSTED BY
shripali
Comprehensive seven layers of security for cybersecurity beginners
The Different Layers:- In this rapid evolving world of AI, securing ourselves has become critically important. In order to Corden the security zone, one needs to combat cyber threats and safeguard their identity by understanding the 7 pivotal layers that form the bulwark against the ever-evolving landscape of cyber threats. In which, each layer offers…
Read morePOSTED BY
shripali
Hinderance of Anti-forensics- A contradiction to cyber forensics
Anti-forensics is a term used for illegal practices performed to temper the quality and quantity of the existing evidences from a crime scene or to hamper it to the extend that it would be difficult to examine or analyse it further. It could be the deliberated actions of the computer users itself or of the…
Read morePOSTED BY
shripali
Darkode:- The one stop shopping for cybercriminals
What is Darkode Popularly known as a one-stop, high-volume shopping destination for some of the most active cybercriminals worldwide. This underground, password-protected online forum, known as Darkode, served as a marketplace for people looking to purchase, sell, and trade malware, botnets, credit card information, personally identifiable information, hacked server credentials, and other software and data…
Read morePOSTED BY