Betabot Trojan Phase II: Stealing credentials and transmitting ransomwares

If there is one thing that hackers and cyber criminals are good at, it’s coming up with new evil Betabot trojans. But can you really…

Rationalizing VM Security: Exploiting DRAMs

When it comes to securing Virtual Machines (VM Security), physical vulnerabilities in memory chips is the Achilles heel amongst all the potential weaknesses currently existing…

Widespread Ransomware attacks in UK, US and Netherlands

SentinelOne (an end point protection company) recently carried out the Freedom of Information (FOI) requests to universities, to establish if ransomware was a significant problem…

Revitalizing Security for Internet of Things (IOT) devices

With the mass adoption of smart devices for Home and industrial usage, the Internet of Things (IOT) ecosystem also introduces a large amount of data…