What is the role of CERT-In in India?

CERT-In

CERT-In, which stands for the Indian Computer Emergency Response Team, is a government agency responsible for cyber security in India. It was established in 2004 under the Information Technology Act, 2000. It’s primary function is to collect, analyze, and disseminate information on cyber incidents. It also provides incident response services, issues security advisories, and coordinates […]

CyberSecurity Wake-up call: Internet outages cost $43 billion a day

cybercure cyber security

Internet outages are a costly problem, both for businesses and individuals. According to a recent study, internet outages cost businesses around the world $43 billion a day. This is a significant cost, and it underscores the importance of cybersecurity. The study that found this figure was conducted by Atlas VPN, a cybersecurity company. The study […]

CBI’s Chakra-II Operation: Crackdown on Cyber-Enabled Financial Crimes

cybercure_cyberfraud_hacker

The Central Bureau of Investigation (CBI) recently conducted a major, Chakra-II Operation, targeting organized cyber-enabled financial crimes. The action spanned across 11 States, involving searches at 76 locations. The Chakra-II Operation reiterates the necessity for heightened vigilance and concerted efforts to combat the stealthy yet pervasive threat of cybercrime. It urges a united front, combining […]

Cybercrime: The invisible enemy that can cripple your business

cybercrime_awareness

Cybercrime is a global problem that is costing businesses billions of dollars each year. No business is immune, regardless of size or industry. Cybercriminals are constantly developing new and sophisticated methods of attack, making it essential for businesses to take proactive steps to protect themselves. Why is Cybercrime so prevalent? There are a number of […]

€5.5 million fine imposed on WhatsApp for data protection violations

On Thursday, Ireland’s Data Protection Commission (DPC) fined Meta’s WhatsApp a new €5.5 million for violating data protection laws when processing users’ personal data.  As a result of the ruling, the platform’s Terms of Service have been updated, requiring users to agree to the new terms in preparation for the General Data Protection Regulation (GDPR) […]

Android devices are being exploited by hackers with RATs

The threat actor behind the BlackRock and ERMAC Android banking trojans has unleashed yet another malware for rent called Hook that introduces new capabilities to access files stored on the devices and create a remote interactive session.  ThreatFabric, in a report, characterized Hook as a novel ERMAC fork that’s advertised for sale for $7,000 per […]

Synology releases patch for critical RCE vulnerability affecting VPN Plus servers

Synology has released a security update to address a critical vulnerability in VPN Plus Server that could be used to take over an affected system. The vulnerability registered as CVE-2022-43931 has a maximum severity of 10 in the CVSS rating and was described as a write out of bounds error in the Remote Desktop feature […]

WhatsApp introduces proxy support to help users bypass internet censorship

Popular instant messaging service WhatsApp has introduced support for proxy servers in the latest versions of its Android and iOS apps. This allows users to avoid government-imposed censorship and internet shutdowns. “By choosing a proxy, he can connect to his WhatsApp through servers set up by volunteers and organizations around the world, allowing people to […]

The Era of Cyber ​​Threat Information Sharing

We have spent 40 years protecting ourselves as individuals. We tried to trick and outsmart the cybercriminals, but when all our efforts failed, we thought of working with our peers to outnumber them. Cybercriminals don’t remake themselves every time. They have limited resources and limited budgets. So they use playbooks to attack a lot of […]