Home / Articles posted bySagganik Guru (Page 5)

Author: Sagganik Guru

China At It Again (An Exclusive Reports): Cyber Threat Actors are again attempting to attack and infiltrate Critical Infra by exploiting well-known Vulnerabilities

Cyber Secure India
China Playing The Cyber Attack Power Game. The Chinese Leadership is ever ready to express its offensive Cyber Capability and keep the adversari...
Read More

Ransomware: The in-topic at the RSA Conference 2022

Cyber Secure India
RSA Conference 2022 at San Francisco, USA. RSA Conference, the world’s leading Information Security conferences and Expositions, after undergoing a...
Read More

Elders Beware, Online Gaming by Young Children can Lead to Losses: Policeman’s son loses Rs 36 lakh from Mother’s and Grandfather’s Accounts Through Mobile Game Addiction Behaviour

Cyber Secure India
A Teenager Boy Loses Rs 36 Lakhs by Playing Mobile Games. In a freak incident reported on 04 June 2022, at Hyderabad; a young 11th grade, 16-year...
Read More

Are mis-configured and mis-managed APIs a trouble for the CISOs

Cyber Secure India
APIs are CISOs’ Greatest Threat to Secure Operations. The Concept of API (Application Programming Interface) has been around in the IT industry ...
Read More

Government of India on the path in Setting up ‘‘India Data Management Office (IDMO)” and to bring out A New Data Governance Policy Framework

Cyber Secure India
GoI Inviting feedback and inputs on Draft National Data Governance Framework Policy The Government of India, Ministry of Electronics and Informati...
Read More

Cyber Attacks on Energy Sector: Strengthening of Defence of This Critical Infrastructure is Never Complete

Cyber Secure India
Strengthening of Defence Energy Sector against Cyber Attacks on Critical Infrastructure. Independent research specialised at risk evaluation of C...
Read More

The Next Generation XML Injection Attacks: What We Need to Know and How to Mitigate the Risk of XML Injection Attacks

Cyber Secure India
XML Injection Attacks and its different variants like XPath, XQuery, XXE & More............ Web Application and Mobile Applications have becom...
Read More

Auth Bypass Vulnerability Noticed: Advisory to Patch VMware Products

Cyber Secure India
VMware critical vulnerability should be patched or mitigated immediately. VMware users have been issued caution by the OEM for two prominent vulner...
Read More

India’s flagship Project UPI hit by frauds thereby Denting India’s Payments Automation Venture: How To Avoid Falling Victim To Them

Cyber Secure India
Fraud incidents rising with surge in UPI transactions. Unified Payments Interface (UPI) frauds have become rampant as much as it is being used by ...
Read More
Top