CALL US

+91 9116117170

Blog

Steganography technique used by New LokiBot Malware

By Chaitra V M 0 Comment August 10, 2019

Lokibot is a malware which steals information by gathering sensitive data and credentials of login from the infected system. The malware is spread either through a malicious link or malicious mail. An email was detected that contained malicious attachment of LokiBot. The attachment had an Excel worksheet and ‘package.json’ labeled package. By running the excel […]

What is Privilege Escalation?

By Annu Choudhari 0 Comment August 10, 2019

Privilege escalation is that attack in which an attacker exploits a software bug to gain access to a resource that is usually protected by the application or user, which leads to a change in privileges for malicious actions that are carried out with greater privileges than expected application developer and system administrator. Known attacks of […]

Clipsa Malware

What is Clipsa Malware | How Clipsa Steals Cryptocurrency and Credentials of WordPress

By Chaitra V M 0 Comment August 8, 2019

Clipsa is a malicious program that is categorized as a password stealer. Cybercriminals use it to steal credentials of poorly secured WordPress websites, cryptocurrencies and replace cryptocurrency addresses. XMRig cryptocurrency miners are designed to install in a few versions of Clipsa. Programs of this type use system resources to mine cryptocurrency. Over 43,000 attacks of […]

Email Spoofing

What is DKIM | How DKIM Works | Prevention From Email Spoofing

By Mohammed Tahir 0 Comment August 7, 2019

DKIM stands for DomainKeys Identified Mail is an email authentication technique that allows the receiver to check that an email was indeed sent and authorized by the owner of that domain or not. DKIM is an email security system that detects email spoofing and ensures the integrity of emails. A Digital signature is given to […]

error: Content is protected by Cyberops !!