Revealing REvil
An Overview of the most dreaded ransomware in recent times Resurgence of Ransomware In April 2019, the Cybereason Nocturnus team encountered several target machines infected with […]
An Overview of the most dreaded ransomware in recent times Resurgence of Ransomware In April 2019, the Cybereason Nocturnus team encountered several target machines infected with […]
According to an announcement made on Tuesday, August 10 by FireEye, a global cybersecurity firm, a coordinated cyberattack, which most likely originated in China, hit […]
Big Ticket Data Breaches How do they go undetected for so long? Introduction July 15, 2020 – PII Data of around 270 million Wattpad (a […]
Trigger Warning – Abuse, Stalking, Death She runs through an endless corridor of darkness, confused and helpless. Her heartbeat racing, her mind on overdrive. Why […]
Multiple threat actors, including Hafnium, LuckyMouse, Calypso, Winnti, Bronze Butler, Websiic, Tonto, Mikroceen, and DLTMiner, are actively targeting four zero-day Microsoft Exchange vulnerabilities (CVE-2021-26855, CVE-2021-26857, […]
Clubhouse and its exponential growth during COVID-19 Clubhouse is an invite-only audio-chat iPhone app founded by Paul Davison and Rohan Seth. It allows users to […]
Brief about the vulnerability The security feature bypass vulnerability (CVE-2020-0689) allows attackers to bypass the secure boot feature and load untrusted or malicious software during […]
Global Cyber Security Spends The world seems to have undergone a decade’s worth of cybersecurity acceleration within a brief period of one year. And that […]
You can read part-1 (Passive Subdomain Enumeration) here. Active sub-domain enumeration techniques Brute force or Dictionary Attacks Brute force means guessing possible combinations of the […]
What is sub-domain Enumeration? Subdomain enumeration is a process of finding subdomains for one or more domains. Why need sub-domain enumeration? Sub-domain enumeration helps to […]