Teaching Aid: Understanding Wireless Security and securing home IoT network

I am glad to share my teaching aid on wireless security with a focus in safeguarding IoT devices. In this teaching aide I talk all about wireless connectivity and authentication modes. Then, I delve into analyzing risks, challenges in securing our home wireless networks and steps we can take to secure our home Wi-Fi. The …

Generative AI used in developing malwares

“OpenAI says it has disrupted 20-plus foreign influence networks in past year”[4] It was about time when analysts and researchers will find AI-generated malware in the wild. Last month, a report published by HP wolf Security[5] highlighted the malicious code has been detected in the recent targeted email campaigns to French users to deliver AsyncRAT …

Ransomware as a Service, Kryptina resurfaces in recent enterprise attacks by Mallox

  Kryptina, once an overlooked free to use Ransomeware as a service available in dark web has resurfaced in recent enterprise attacks. [4]Its return has been marked by an advanced and potent version as per research presented by SentilLabs in LABScon 2024 reported by infosec-magazine.  Mallox Linux 1.0 Mallox Ransomware Group also known as , a …