The ease of mobility and the ease of convergence, have made not only the Domestic Users of IT and ICT, but even the Enterprise Users, switch to th... Read More
Two CVEs (Common Vulnerabilities and Exposures) namely CVE-2022-27925 and CVE-2022-37042, where earlier reported and was targeted towards the Zimb... Read More
A ‘Banking Trojan’ is a piece of malware that is used primarily to steal banking credentials by remotely installing malicious software on a vic... Read More
Heat Map of "Maggie" Malware (Highest infection being India)
Cyber attacks on Enterprises have been on the rise, post the COVID period. The Sophis... Read More
A few good recce-warriors or Android Watchers have been able to identify the next batch of Unsuspected Android Apps being used by attackers to pus... Read More
In a recent announcement, the Government of India, voiced the concerns of the obsolete state of the over two-decade old IT Act (Information Techno... Read More
China, as a country is said to be among the most obsessed nations, with a Communist Regime, of its Cyber Security and Cyber Breach Consciousness. ... Read More
Forget Pegasus, new spyware 'Hermit' on Android Discovered in Targeted Attacks..
Even as the allegation being heard by the Hon’ble Supreme Court of... Read More
China Playing The Cyber Attack Power Game.
The Chinese Leadership is ever ready to express its offensive Cyber Capability and keep the adversari... Read More
VMware critical vulnerability should be patched or mitigated immediately.
VMware users have been issued caution by the OEM for two prominent vulner... Read More