Our Blog

Read our latest blog posts

Everything You Need to Know about the Pegasus Spyware

On 18 July 2021, The Pegasus Project reported that they obtained over 50,000 phone numbers of potential...

Continue reading

Kaseya VSA Supply Chain Ransomware Incident

On 02 July 2021, Kaseya disclosed that they were the victim of a large-scale ransomware attack. Here...

Continue reading

XVigil’s Fake Domain Finder: A Deep-dive on the Acquisition Component and...

Here's how XVigil's Fake Domain Finder framework uses the Acquisition component and crawlers to identify fake domains...

Continue reading

Domino’s Breach and the Nucleus ransomware attack: More than just isolated...

We are investigating the possible attack vectors that could have led to the compromise of Domino’s Breach...

Continue reading

The Future of Web Tracking

Google is moving towards a privacy-focused approach with regards to web tracking, by rewriting conventional ad tracking...

Continue reading

Modern Underground Marketplaces and Digital Goods

How do modern underground marketplaces operate? What are digital goods and how have they played a major...

Continue reading

Intelligent Searching Techniques in Artificial Intelligence

This blog breaks down various search techniques of Intelligent Agents when faced with complex problems in Artificial...

Continue reading

Design Thinking Through the Lenses of Innovation

Design Thinking, a human-centered process, solves even the most complex problems for innovative companies like Infosys, PepsiCo,...

Continue reading

Cloud Container Attack Tool (CCAT) and Cryptojacking

The deficiency of container security tools is a major concern among developers. Find out how you can...

Continue reading

Three Quick Wins to Address in an Active Directory Environment

The popularity of Active Directory makes it a juicy target for cyber extortion. Here are some quick...

Continue reading