top of page

Search


CRYPTOJACKING-The Unwanted guest in your system.
Cryptojacking This is a cybercrime in which criminals use your ( victim's) computing power to generate cryptocurrency without ..More

Automated blog algorithm.
Apr 1, 20222 min read
52 views
0 comments


SPYWARE | The internet spy
Although it sounds like something like a sci-fi movie but spyware is all too real. These can be any software that installs itself on the...

CYBOT-X Technologies
Mar 14, 20221 min read
44 views
0 comments


Stop Neglecting Start Monitoring the Network traffic.
The current system limitations can be beneficial for hackers. Improve those deployed systems before getting compromised.

Akash Khedikar
Feb 22, 20222 min read
49 views
0 comments


The effect of Packet crafting on IDP System.
Packet crafting is the art of creating something skillfully all the vulnerability assessment tools used by network administrators to test...

CYBOT-X Technologies
Feb 14, 20222 min read
32 views
0 comments


Social Engineering: The Manipulation of Human psychology.
Manipulation of human psychology techniques of social engineering. How attacker gain trust of victim and carry out social engineering attack

Akash Khedikar
Jan 21, 20222 min read
75 views
0 comments


World's Most Dangerous Cyber Threat: CLOP Ransomware
. Cybersecurity researchers have warned of emerging ransomware groups almost every day that could pose a significant threat to businesses:

Akash Khedikar
Jan 1, 20222 min read
21 views
0 comments
bottom of page