top of page



Hack-to-Trade: A Concern for executives
In the past, few Hackers gained access to insider information that netted him millions of dollars. UK national Robert B. Westbrook successfully compromised a CFO's outlook account and added an auto-forward rule in mailbox to redirect all the emails to a disposable temporary email address. Hiding traces under multiple layers of VPN channel, transacting through untraceable accounts, bitcoin transactions but still couldn't escape the investigating agencies. Westbrook's scheme ne

CRAC Learning
6 days ago2 min read
Â
Â
Â


Maritime History Rewritten: First Vessels Delivered with Cybersecurity Notations
Cyber-Resilient Ship In an era where ships are as connected as cities, the sea is no longer a sanctuary from cyber threats. Vard which is...

CRAC Learning
Jun 42 min read
Â
Â
Â


Everest Group - What Happens When Your HR System Becomes Your Weakest Link?
Everest Group , is an old name in cyber extortion and now it is rewriting the rulebook for modern cybercrime. It has come into spotlight...

CRAC Learning
Jun 22 min read
Â
Â
Â


The Ethics of Hacking Back: Defense or Revenge?                      Â
In an age where cyberattacks are becoming more complex and widespread, governments and organizations are constantly faced with the choice...

CRAC Learning
Apr 232 min read
Â
Â
Â


Decoding the Latest Government Cybersecurity PoliciesÂ
Technology has become an integral part of our lives and the importance of cybersecurity in today's day and age cannot be overemphasized....
Bhavgun Kaur
Mar 316 min read
Â
Â
Â


AI's Role in Early Detection of Cyber Threats: The Frontier of Cybersecurity
In today's digital world, cybersecurity is crucial. As cyber threats become increasingly sophisticated, traditional defenses are no...
Asis Kaur
Mar 255 min read
Â
Â
Â


Securing your Instagram account
Recently there have been multiple scenarios leading Instagram account compromise of users especially, targeting the influencers. With a...

CRAC Learning
Feb 202 min read
Â
Â
Â


A Deep Dive into Phishing URL Detection
In today's digital age, cyber security is more critical than ever. One of the most prevalent threats is phishing , where attackers...

CRAC Learning
Jan 114 min read
Â
Â
Â
Internship Experience — Cybersecurity with AI
Let’s hear from our Cybersecurity with AI Research intern — Dinki Gupta about their Summer internship 2024 experience. I’m Dinki Gupta, a...

CRAC Learning
Dec 22, 20243 min read
Â
Â
Â


Content Security Policy (CSP) Bypass
What is Content Security Policy (CSP) Content Security Policy (CSP) is a browser security standard developed by the W3C to help web...

CRAC Learning
Nov 17, 20244 min read
Â
Â
Â


Secure usage of parental control applications
Popular parental control apps for Android, iOS could be exploited risking user data and safety. Parental apps are by nature intrusive to...

CRAC Learning
Mar 18, 20242 min read
Â
Â
Â


Remcos Everywhere: Decoding the Stealthy Cyber Threat
In the ever-evolving landscape of cybersecurity threats, a new player has emerged: Remcos. This previously undocumented malware has been...

CRAC Learning
Mar 13, 20242 min read
Â
Â
Â


MINIBUS Intruders: UNC1549’s Cyber Espionage in the Middle East
A group of hackers, known as UNC1549, has been busy targeting aerospace, aviation, and defense industries in the Middle East. Their focus...
Kritika Gaur
Mar 7, 20242 min read
Â
Â
Â


Digital Spies and Sneaky Invitations: Unmasking the SPIKEDWINE Backdoor
A previously unknown threat actor (we’ll call them SPIKEDWINE) has been targeting European officials who are connected to Indian...

CRAC Learning
Mar 6, 20242 min read
Â
Â
Â


SSH-Snake: Fresh Self-Adapting Worm Poses Network Risks
The Sysdig Threat Research Team (TRT) has uncovered the malicious utilization of a newly developed network mapping tool named SSH-Snake,...

CRAC Learning
Mar 1, 20242 min read
Â
Â
Â


Scientists Recreate Fingerprints from Touchscreen Swiping Sound
Researchers have devised a method called PrintListener to recreate fingerprints solely from the sound they produce while swiping a...
Kritika Gaur
Feb 26, 20241 min read
Â
Â
Â


Auto-Execution in MoqHao Android Malware
Overview A new variant of Android malware known as MoqHao has been identified by threat hunters. Unlike typical MoqHao variants that...
Kritika Gaur
Feb 23, 20242 min read
Â
Â
Â


RustDoor: macOS Backdoor Lures Cryptocurrency Firms with Fake Jobs
Previously in our blog, we talked about how Visual Studio fake updates distributed to spread RustDoor malware. Many Cryptocurrency...

CRAC Learning
Feb 19, 20242 min read
Â
Â
Â


Malicious 'SNS Sender' Script Abuses AWS for Bulk Smishing Attacks
Overview SentinelLabs has identified SNS Sender, a malicious Python script that uses AWS Simple Notification Service (SNS) to send bulk...
Kritika Gaur
Feb 19, 20242 min read
Â
Â
Â


Visual Studio fake updates distributed to spread RustDoor malware
Overview RustDoor is a new malware strain targeting macOS users by masquerading as a legitimate update for Visual Studio (VS). VS is a...

CRAC Learning
Feb 14, 20241 min read
Â
Â
Â
bottom of page





