Blog Posts
BrasDex is a new Android malware from Casbaneiro Actors
A new Android malware called BrasDex was exposed to users in Brazil as part of a multi-platform campaign. The malware targets a series of Brazilian
85% of attacks now use encrypted channels
According to Zscaler, malware continues to be the biggest threat to individuals and businesses across nine key industries, with manufacturing, education, and healthcare being the
What Cybercrime & Security Will Look Like in 2023
Threat actors continue to adapt to the latest technologies, practices, and even privacy laws. It’s up to your organization to stay ahead by implementing strong
Google takes Gmail security to the next level with client-side encryption
Google announced Friday that client-side encryption for Gmail is in beta for workspace and education customers. This is part of an effort to secure emails
Cybersecurity is not a losing game – start now
Reality has a way of asserting itself, no matter what personal or business choices we make, good or bad. For example, very recently, the services
What developers need to deal with common vulnerabilities
Today’s threat landscape is constantly changing, and now more than ever, organizations and businesses across all industries have an urgent need to consistently produce and
Why is Robust API Security Important in Ecommerce?
API attacks are on the rise. One of their main targets is e-commerce businesses like yours. APIs are an integral part of how e-commerce businesses
South Delhi businessman duped of over Rs 50 lakh through missed calls, cops say no OTP was shared
A South Delhi-based businessman was duped of more than Rs 50 lakh by unknown fraudsters through missed calls, the police said Tuesday, adding that the
24% of Technology applications contain high-risk security vulnerabilities
With a higher percentage of applications arguably processed than other industries, technology companies can benefit from implementing improved secure coding training and practices for their
Tech InDepth: Understanding a future without passkeys and passwords
Tech giants like Apple and Google don’t always have the same mindset when it comes to innovation. For example, take the RCS vs. iMessage debate.
New Digital Personal Data Protection Bill in India ,2022
The new Digital Personal Data Protection Bill, 2022, which was unveiled on 18 November, puts more focus on personal data than previous cumbersome drafts. The
Lets talk about Supply Chain Attacks and Cloud Native
The past couple of years have seen an upward push in software supply chain attack, with the maximum salient example being the SolarWinds attack. As
AIIMS cyber attack should be treated as wake-up call for all Cyber Security Companies in India
On November 23 this year, the premier medical institute in the country, the All India Institute of Medical Sciences New Delhi (AIIMS) was crippled by
How to secure your WordPress Websites
WordPress is the most popular blogging and CMS system, which makes it a favorite target for Hackers. Having a WordPress site means that you have
READ OR SPY WHATSAPP MESSAGES OF HUSBAND, WIFE OR GIRL FRIEND
Disclaimer: This article has been written for educational purpose only. We don’t encourage hacking or cracking. In fact we are here discussing the ways that hackers
Unpatched ModSecurity CRS vulnerabilities leave web servers open to denial-of-service attacks
ReDoS flaws discovered in the OWASP Core Rule Set A clutch of unpatched vulnerabilities in ModSecurity’s OWASP Core Rule Set has left potentially thousands of
Nmap – Penetration Testing Tool to Perform Information Gathering
Nmap is an open source network monitoring and port scanning tool to find the hosts and services in the computer by sending the packets to
Importance of Summer Internship for Engineers
Unlike other professions, engineering job is based on the logical implementation of knowledge in a step by step manner. A successful engineer needs to have an analytical
Importance of Summer training for Engineers
Internships are often viewed negatively by engineering graduates due the belief that interns are made to do menial jobs which don’t add up to their
How to Keep Your Mobile Safe from Cyber Threats
[et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”3.0.47″][et_pb_row admin_label=”row” _builder_version=”3.0.48″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_text admin_label=”Text” _builder_version=”3.0.74″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”] Before smartphones were popular, people didn’t take