Malware Development – Welcome to the Dark Side: Part 1

If you are in cybersecurity, especially Red Teaming, writing a full-undetectable (FUD) malware is a great skill to have. Folks tend to use Metasploit combined with Veil-Evasion or PE injectors like LordPE or Shelter, to generate a binary which can bypass the antivirus. Sometimes this works and sometimes it does not. The worst thing that […]

Cyber Security In Civil Aviation

  From the year 2012-2025 ICAO(International civil aviation organization) have decided to transform the present aviation environment by introducing new technology which will revolutionize present aviation industry. According to ICAO, the technology responsible to do so is named NextGen (Next Generation Air Transportation System), which is developed by the United States and will be mandatory […]

What ails India’s cyber crime cells?

by K K Mookhey, NII Consulting Scott Carney over at Trailing Technologies did an interesting post on the Chennai Cyber Crime Cell needing an upgrade. The officers informed him that their lack of success was due to a lack of proper equipment, and that they needed a Rs. 1 crore (USD 200,000) investment to actually […]