In a nutshell, Email spoofing is a technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust.
Posts Written ByAmol Wanave
Drovorub Linux Rootkit IOCs
Drovorub Linux Rootkit IOCs captured by IOC pivoting using VirusTotal Graph. Consume these indicators to detect Drovorub in your network.
Cyber Threat Intelligence – The Next Big Thing
Cyber Threat Intelligence has been the hottest buzzword in the recent times in cyber security space. Be it any security conference or a podcast or a launch of a new…
Spelevo Exploit Kit
Spelevo exploit kit IOCs Recently, Malwarebytes Labs captured an unusual change with the Spelevo exploit kit where, after an attempt to trigger vulnerabilities in Internet Explorer and Flash Player, users…
Zeppelin Ransomware IOCs
Zeppelin is the newest member of the Delphi-based Ransomware-as-a-Service (RaaS) family initially known as Vega or VegaLocker. It is discovered that Zeppelin is targeting a handful of carefully chosen tech…
Incident Response Plan for Phishing Attacks
Executive Summary Incident Response (IR) Plan has vital importance in case of cyber-security incidents and business continuity of organizations. IR Plans provide step by step procedures or standard operating procedures…