Breaking up on Valentine’s Day!Featured

Valentine’s Day is approaching fast. And on this day, if anyone is more active than lovers around the world, it is the cybercriminals.  Cybercriminals always look for opportunities to take advantage of oblivious online consumers. From counterfeit gift scams to fake dating apps, their presence is everywhere.  Research from security firm Check Point revealed that over […]


Building a covert SMTP infrastructure

Introduction Phishing is a ray of light when every attempt to breach an organization fails. However, setting up a covert SMTP infrastructure for phishing is a time consuming and painful process. By a covert SMTP infrastructure, I mean an infrastructure: which has an ability to evade detection; typically to throw off blue teams which has […]