top of page



Smart Security Research Diaries: Defending the Internet of Things.
18th of January, 2026 - The day started with some network troubleshooting and system administration as we forgot to bring our wi-fi router that was earlier acting as a gateway. But yeah, after scratching our heads we were finally able to use one of our laptops as the gateway which really helped us capture all the data frames via Wireshark. Today, our main goal was to get Remote Code Execution on our target. Last time we found a Buffer-Overlfow based Denial-of-Service vulnera

Azim Javed
2 days ago3 min read


AI Cyberattacks in India: The New-Age Hackers We’re Not Ready For
AI Cyberattacks in India: The New-Age Hackers We’re Not Ready For

Om Mishra
Dec 15, 202511 min read


Hack-to-Trade: A Concern for executives
In the past, few Hackers gained access to insider information that netted him millions of dollars. UK national Robert B. Westbrook successfully compromised a CFO's outlook account and added an auto-forward rule in mailbox to redirect all the emails to a disposable temporary email address. Hiding traces under multiple layers of VPN channel, transacting through untraceable accounts, bitcoin transactions but still couldn't escape the investigating agencies. Westbrook's scheme ne

CRAC Learning
Dec 7, 20252 min read


Maritime History Rewritten: First Vessels Delivered with Cybersecurity Notations
Cyber-Resilient Ship In an era where ships are as connected as cities, the sea is no longer a sanctuary from cyber threats. Vard which is...

CRAC Learning
Jun 4, 20252 min read


Everest Group - What Happens When Your HR System Becomes Your Weakest Link?
Everest Group , is an old name in cyber extortion and now it is rewriting the rulebook for modern cybercrime. It has come into spotlight...

CRAC Learning
Jun 2, 20252 min read


The Ethics of Hacking Back: Defense or Revenge?
In an age where cyberattacks are becoming more complex and widespread, governments and organizations are constantly faced with the choice...

CRAC Learning
Apr 23, 20252 min read


Decoding the Latest Government Cybersecurity Policies
Technology has become an integral part of our lives and the importance of cybersecurity in today's day and age cannot be overemphasized....
Bhavgun Kaur
Mar 31, 20256 min read


AI's Role in Early Detection of Cyber Threats: The Frontier of Cybersecurity
In today's digital world, cybersecurity is crucial. As cyber threats become increasingly sophisticated, traditional defenses are no...
Asis Kaur
Mar 25, 20255 min read


Securing your Instagram account
Recently there have been multiple scenarios leading Instagram account compromise of users especially, targeting the influencers. With a...

CRAC Learning
Feb 20, 20252 min read


A Deep Dive into Phishing URL Detection
In today's digital age, cyber security is more critical than ever. One of the most prevalent threats is phishing , where attackers...

CRAC Learning
Jan 11, 20254 min read
Internship Experience — Cybersecurity with AI
Let’s hear from our Cybersecurity with AI Research intern — Dinki Gupta about their Summer internship 2024 experience. I’m Dinki Gupta, a...

CRAC Learning
Dec 22, 20243 min read


Content Security Policy (CSP) Bypass
What is Content Security Policy (CSP) Content Security Policy (CSP) is a browser security standard developed by the W3C to help web...

CRAC Learning
Nov 17, 20244 min read


Secure usage of parental control applications
Popular parental control apps for Android, iOS could be exploited risking user data and safety. Parental apps are by nature intrusive to...

CRAC Learning
Mar 18, 20242 min read


Remcos Everywhere: Decoding the Stealthy Cyber Threat
In the ever-evolving landscape of cybersecurity threats, a new player has emerged: Remcos. This previously undocumented malware has been...

CRAC Learning
Mar 13, 20242 min read


MINIBUS Intruders: UNC1549’s Cyber Espionage in the Middle East
A group of hackers, known as UNC1549, has been busy targeting aerospace, aviation, and defense industries in the Middle East. Their focus...
Kritika Gaur
Mar 7, 20242 min read


Digital Spies and Sneaky Invitations: Unmasking the SPIKEDWINE Backdoor
A previously unknown threat actor (we’ll call them SPIKEDWINE) has been targeting European officials who are connected to Indian...

CRAC Learning
Mar 6, 20242 min read


SSH-Snake: Fresh Self-Adapting Worm Poses Network Risks
The Sysdig Threat Research Team (TRT) has uncovered the malicious utilization of a newly developed network mapping tool named SSH-Snake,...

CRAC Learning
Mar 1, 20242 min read


Scientists Recreate Fingerprints from Touchscreen Swiping Sound
Researchers have devised a method called PrintListener to recreate fingerprints solely from the sound they produce while swiping a...
Kritika Gaur
Feb 26, 20241 min read


Auto-Execution in MoqHao Android Malware
Overview A new variant of Android malware known as MoqHao has been identified by threat hunters. Unlike typical MoqHao variants that...
Kritika Gaur
Feb 23, 20242 min read


RustDoor: macOS Backdoor Lures Cryptocurrency Firms with Fake Jobs
Previously in our blog, we talked about how Visual Studio fake updates distributed to spread RustDoor malware. Many Cryptocurrency...

CRAC Learning
Feb 19, 20242 min read
bottom of page





