Estimated reading time: 7 minutes
In recent years, Android malware campaigns in India have increasingly abused the trust associated with government services and official digital platforms. By imitating well-known portals and leveraging social engineering through messaging applications, threat actors exploit user urgency and lack...Information Technology, Network Security & Cybersecurity Updates
Estimated reading time: 4 minutes
India’s Digital Personal Data Protection (DPDP) Act fundamentally changes how organizations collect, use, store, and protect personal data. It applies to any organization handling digital personal data of individuals in India, regardless of where the organization is located. For...
Estimated reading time: 11 minutes
Contents Introduction Key Targets. Industries Affected. Geographical Focus. Infection Chain. Initial Findings. Looking into the decoy-document Technical Analysis Stage 1 – Malicious LNK Script Stage 2 – DUPERUNNER Implant Stage 3 – AdaptixC2 Beacon. Infrastructural Artefacts. Conclusion SEQRITE Protection....Estimated reading time: 11 minutes
Table of Contents: Introduction: Infection Chain: Targeted sectors: Initial Findings about Campaign: Analysis of Decoy: Technical Analysis: Stage-1: Analysis of Windows Shortcut file (.LNK). Stage-2: Analysis of Batch file. Stage-3: Details analysis of Covert RAT. Conclusion: Seqrite Coverage: IOCs...Estimated reading time: 10 minutes
Contents Introduction Key Targets Industries Affected Geographical focus Infection Chain. Initial Findings Looking into the decoy-document Technical Analysis Stage 1 – Malicious ISO File Stage 2 – Malicious LNK File Stage 3 – Final Payload: FALSECUB Infrastructure & Attribution...
Estimated reading time: 2 minutes
Algorithms and statistical models are no longer just technical tools, they are decision-making engines. From personalizing offers to predicting credit risk or churn, businesses increasingly rely on automated systems that process personal data at scale. But with this power...
Estimated reading time: 12 minutes
Key Targets. Industries Affected. Geographical Focus. Infection Chain – Operation IconCat. Infection Chain – I. Infection Chain – II. Campaign-Analysis – Operation IconCat. Campaign-I Initial Findings. Looking into the malicious PDF File. Technical Analysis. Malicious PyInstaller implant – PYTRIC...