top of page
Table of Content


LLMNR Attacks: Exploiting Local Name Resolution for Credential Theft
In the complex landscape of network security, even seemingly benign protocols can become avenues for attack. One such protocol is...
Akshay Jain
3 min read


NotPetya: The Cyberattack That Masqueraded as Ransomware
In June 2017, a destructive cyber campaign swept across the globe, initially disguised as ransomware but ultimately designed to cause...
Akshay Jain
3 min read


Operation Carbanak: The Cyber Heist That Stole a Billion Dollars from Banks
Imagine a cybercriminal operation so sophisticated that it orchestrated bank heists on a global scale, siphoning off over a billion...
Akshay Jain
3 min read


Cryptojacking: The Silent Hijacker of Your CPU Resources
Imagine waking up to sluggish system performance and soaring electricity bills, only to discover that an unseen attacker has been...
Akshay Jain
3 min read


Cold Boot Attacks: Extracting Secrets from Memory
Ever wondered if shutting down your computer makes it completely secure? Think again. Cold boot attacks exploit a fascinating property of...
Akshay Jain
3 min read
bottom of page