Home

Reading Time: < 1 minutes

The rise of Ransomware: How hackers are hijacking your data

The rise of Ransomware: How hackers are hijacking your data

Reading Time: 2 minutes Ransomware is a one of category in malware that encrypts the victim’s data and demands ...
Read More
Mailchimp security breach – One more victim for Social Engineering  attack

Mailchimp security breach – One more victim for Social Engineering attack

Reading Time: < 1 minutes Marketing automation company Mailchimp has reported that it has been the victim of a ...
Read More
Upcoming cyber security events 2022

Upcoming cyber security events 2022

Reading Time: 2 minutes After a massive response from security community at NullCon Goa, India event shows offline participation ...
Read More
Twilio Suffers Data Breach After Social engineering attack on employees

Twilio Suffers Data Breach After Social engineering attack on employees

Reading Time: < 1 minutes Customer engagement platform Twilio on Monday, August 4, 2022 announced of unauthorized access to ...
Read More
Govt withdraws PDP- Data Protection Bill 2019 and will replace with more comprehensive framework

Govt withdraws PDP- Data Protection Bill 2019 and will replace with more comprehensive framework

Reading Time: < 1 minutes The Indian Govt on Wednesday 3rd Aug 2022 withdrew the long-awaited Personal Data Protection ...
Read More
HTTP/3 protocol has received RFC 9114 standardization

HTTP/3 protocol has received RFC 9114 standardization

Reading Time: < 1 minutes The backbone of the web has received a major upgrade. The HTTP/3 protocol has ...
Read More
The Centre for Threat Informed Defense releases NIST 800-53 Controls to ATT&CK Mappings

The Centre for Threat Informed Defense releases NIST 800-53 Controls to ATT&CK Mappings

Reading Time: < 1 minutes The Centre for Threat Informed Defence releases mappings between MITRE ATT&CK® and NIST Special ...
Read More
Extremely critical vulnerability in Apache Log4j popular library-CVE-2021-44228

Extremely critical vulnerability in Apache Log4j popular library-CVE-2021-44228

Reading Time: 2 minutes Log4j is popular java library used as logging framework in most of the application. This ...
Read More
<b>Microsoft  launches  cybersecurity skilling program that aims to skill over 1 lakh learners by 2022.</b>

Microsoft launches cybersecurity skilling program that aims to skill over 1 lakh learners by 2022.

Reading Time: < 1 minutes Industry’s first comprehensive cybersecurity skilling program to empower India’s workforce for a career in ...
Read More
<b>Go Daddy data breach exposes over 1 million customer details in managed WordPress hosting environment</b>

Go Daddy data breach exposes over 1 million customer details in managed WordPress hosting environment

Reading Time: < 1 minutes Web-hosting giant GoDaddy has confirmed another data breach, this time affecting at least 1.2 ...
Read More
<b>What is Pegasus</b>

What is Pegasus

Reading Time: < 1 minutes Pegasus is the spyware – that is developed, marketed and licensed to governments around ...
Read More
<b>VAPT</b>

VAPT

Reading Time: 2 minutes An analysis of criminal forums revealed information regarding top trending Common Vulnerabilities and Exposures (CVEs) ...
Read More
<b>China accused of cyber-attack on Microsoft Exchange servers</b>

China accused of cyber-attack on Microsoft Exchange servers

Reading Time: 3 minutes  US and EU have accused China of carrying out a major cyber-attack earlier this year. ...
Read More
<b>Data breaches</b>

Data breaches

Reading Time: 2 minutes Since a  long time the Cost of a Data Breach Report is produced jointly between ...
Read More
<b>Ransomware</b>

Ransomware

Reading Time: 2 minutes Approximately three weeks later a Florida-based software vendor Kaseya which was hit by a widespread ...
Read More