Businesses usually tend to trust their partners/ technology partners when related to the security of the data flowing across partners. This approach has changed drastically these days; now businesses themselves need to focus on their cyber security measures. There is a sudden rise in the number of supply chain attacks, by which we can conclude that attackers are easily spotting out vulnerabilities in the supply chain network of the organisations.
Start, Up and Away: Pankit Desai and Anand Naik, the cyber warriors securing India’s digital landscape There is a certain sense of calm and certainty about Pankit Desai and Anand Naik. The two industry veterans aren’t like the usual bright-eyed startup founders one comes across. Instead, both of them come from a place of experience and […]
Overview Here at Sequretek Malware Analysis lab (SMA-LAB) we observed a new type of clever and sophisticated Ransomware variant dubbed as “AVCRYPT” which attempts to uninstall existing security software present on the victim PCs before performing its malevolent activities. AVCRYPT was discovered by cyber-security researchers which include Lawrence Abrams, MalwareHunterTeam and Michael Gillespie. Technical Analysis […]
Introduction With the help of this report I will explain how we make a POC exploitable. In place of malicious payload, I use reverse connection (Shell.exe) payload with the help of Metasploit. Description Dot NET Framework Remote Code Execution Vulnerability. Microsoft Windows is prone to remote code-execution vulnerability. Successfully exploiting this issue may allow attackers […]