Estimated reading time: 11 minutes
Contents Introduction Key Targets. Industries Affected. Geographical Focus. Initial Findings. Looking into the decoy-document – I Looking into the decoy-document – II Infection Chain. Technical Analysis Stage 1 – Malicious LNK Script & VBScript. Stage 2 – Malicious Cobalt...
Estimated reading time: 2 minutes
The recent data breach at one of India’s largest health insurance companies has left millions of customers vulnerable, raising serious concerns about data privacy and security. With personal and medical information exposed, many are left wondering: How could this...
Estimated reading time: 4 minutes
In today’s rapidly evolving cybersecurity landscape, enterprises face an onslaught of sophisticated threats that can evade traditional security measures. From stealthy malware to advanced persistent threats (APTs), the arsenal of modern cybercriminals continues to expand, posing formidable challenges to...