The Dark Face of the Web: Dark Web & Deep Web

Blog Discover the distinctions between dark web – deep web, examining their roles, accessibility and implications for cybersecurity and illicit activities. The distinctions between dark web – deep web Web is the common name of the “World Wide Web“, which is a subset of the internet that consists of pages that can be accessed via […]
What is BOTNET?

Blog A botnet is a network of compromised computers controlled by a malicious actor, often used to launch large-scale cyber attacks. Cyber attackers establish a network by infecting computers with malware. This remotely controlled malware is called a “bot“. The network of these bots is called a “botnet“. These computers are also called zombies. Sometimes […]
LockBit 2.0 Ransomware Analysis

Blog 1 Executive Summary 1.1 Overview LockBit 2.0 is a Ransomware as a Service (RaaS), with an Affiliate program in place. Oftentimes, their binaries are cryptographically signed with valid, stolen certificates. LockBit Ransomware have some similarity with Maze Ransomware in UAC bypass techniques but Encryption Routine makes LockBit 2.0 so powerful and fast against other […]
NOBELIUM APT29 – EnvyScout

Blog Summary of Analysis The NOBELIUM group is also known as APT29. NOBELIUM has generally targeted government institutions, non-governmental organizations, think tanks, the military, IT service providers, R&D companies working in the healthcare field, and telecommunication providers in its attacks so far. It has been observed that the NOBELIUM group has been using Spear Phishing […]