The Dark Face of the Web: Dark Web&Deep Web

Blog Web is the common name of the “World Wide Web“, which is a subset of the internet that consists of pages that can be accessed via any web browser. There are those who think the internet is just search engines, but the internet is a huge world. The internet world is divided into three. […]
What is BOTNET?

Blog Cyber attackers establish a network by infecting computers with malware. This remotely controlled malware is called a “bot“. The network of these bots is called a “botnet“. These computers are also called zombies. Sometimes cyber attackers set up a large botnet to make it easier and more organized for attacks to be carried out. […]
LockBit 2.0 Ransomware Analysis

Blog 1 Executive Summary 1.1 Overview LockBit 2.0 is a Ransomware as a Service (RaaS), with an Affiliate program in place. Oftentimes, their binaries are cryptographically signed with valid, stolen certificates. LockBit Ransomware have some similarity with Maze Ransomware in UAC bypass techniques but Encryption Routine makes LockBit 2.0 so powerful and fast against other […]
NOBELIUM APT29 – EnvyScout

Blog Summary of Analysis The NOBELIUM group is also known as APT29. NOBELIUM has generally targeted government institutions, non-governmental organizations, think tanks, the military, IT service providers, R&D companies working in the healthcare field, and telecommunication providers in its attacks so far. It has been observed that the NOBELIUM group has been using Spear Phishing […]