top of page

Search


Automated blog algorithm.
Apr 1, 20222 min read
CRYPTOJACKING-The Unwanted guest in your system.
Cryptojacking This is a cybercrime in which criminals use your ( victim's) computing power to generate cryptocurrency without ..More
52 views
0 comments

CYBOT-X Technologies
Mar 14, 20221 min read
SPYWARE | The internet spy
Although it sounds like something like a sci-fi movie but spyware is all too real. These can be any software that installs itself on the...
41 views
0 comments


Akash Khedikar
Feb 22, 20222 min read
Stop Neglecting Start Monitoring the Network traffic.
The current system limitations can be beneficial for hackers. Improve those deployed systems before getting compromised.
49 views
0 comments


CYBOT-X Technologies
Feb 14, 20222 min read
The effect of Packet crafting on IDP System.
Packet crafting is the art of creating something skillfully all the vulnerability assessment tools used by network administrators to test...
29 views
0 comments


Akash Khedikar
Jan 21, 20222 min read
Social Engineering: The Manipulation of Human psychology.
Manipulation of human psychology techniques of social engineering. How attacker gain trust of victim and carry out social engineering attack
75 views
0 comments

Akash Khedikar
Jan 1, 20222 min read
World's Most Dangerous Cyber Threat: CLOP Ransomware
. Cybersecurity researchers have warned of emerging ransomware groups almost every day that could pose a significant threat to businesses:
21 views
0 comments
bottom of page