Automated blog algorithm.Apr 1, 20222 min readCRYPTOJACKING-The Unwanted guest in your system.Cryptojacking This is a cybercrime in which criminals use your ( victim's) computing power to generate cryptocurrency without ..More
CYBOT-X TechnologiesMar 14, 20221 min readSPYWARE | The internet spyAlthough it sounds like something like a sci-fi movie but spyware is all too real. These can be any software that installs itself on the...
Akash KhedikarFeb 22, 20222 min readStop Neglecting Start Monitoring the Network traffic.The current system limitations can be beneficial for hackers. Improve those deployed systems before getting compromised.
CYBOT-X TechnologiesFeb 14, 20222 min readThe effect of Packet crafting on IDP System.Packet crafting is the art of creating something skillfully all the vulnerability assessment tools used by network administrators to test...
Akash KhedikarJan 21, 20222 min readSocial Engineering: The Manipulation of Human psychology.Manipulation of human psychology techniques of social engineering. How attacker gain trust of victim and carry out social engineering attack
Akash KhedikarJan 1, 20222 min readWorld's Most Dangerous Cyber Threat: CLOP Ransomware. Cybersecurity researchers have warned of emerging ransomware groups almost every day that could pose a significant threat to businesses: