Tag: Research

Read our latest blog posts

Resurgence of DJVU/STOP Ransomware Strain in the Wild (Part 2/2)

We continue to track the behaviour of the DJVU/STOP ransomware in this 2nd part of the 2...

Continue reading

Resurgence of DJVU/STOP Ransomware Strain in the Wild (Part 1/2)

We delve into the modus operandi of the DJVU/STOP ransomware, its technicalities and features, how it identifies...

Continue reading

Advanced Automated Social Engineering Bots: The High Tide of Social Engineering...

This article provides an overview of SMS Ranger and how OTP bots are exploited by threat actors.

Continue reading

The Unabated Reign of ATM Hacking: The 2021 Rajasthan ATM Attack...

Here are the specifics of the numerous physical and electronic attack vectors used by ATM hackers, highlighting...

Continue reading

Disgruntled Affiliate Reveals Conti Ransomware Attack Techniques

The group has actively targeted the healthcare industry and first responder networks when COVID was at its...

Continue reading

CloudSEK’s Selenium Grid Architecture and Data Acquisition

We discuss the various components of a complex Selenium Grid architecture to help readers understand how singular...

Continue reading

Everything You Need to Know about the Pegasus Spyware

On 18 July 2021, The Pegasus Project reported that they obtained over 50,000 phone numbers of potential...

Continue reading

XVigil’s Fake Domain Finder: A Deep-dive on the Acquisition Component and...

Here's how XVigil's Fake Domain Finder framework uses the Acquisition component and crawlers to identify fake domains...

Continue reading

Domino’s Breach and the Nucleus ransomware attack: More than just isolated...

We are investigating the possible attack vectors that could have led to the compromise of Domino’s Breach...

Continue reading

Helm: Paving the Way to Environment Aware Deployments

Creating and managing multiple deployments and sets of config. files can be a cumbersome task. But with...

Continue reading