Five (5) Search Results you may not trust on the first go on Google Search in India

Cyber Secure India
Google Search in India.. Google has become the companion of our life in the Digital Journey that we ensue day-after-day. The word “Google” is at th...
Read More

China At It Again (An Exclusive Reports): Cyber Threat Actors are again attempting to attack and infiltrate Critical Infra by exploiting well-known Vulnerabilities

Cyber Secure India
China Playing The Cyber Attack Power Game. The Chinese Leadership is ever ready to express its offensive Cyber Capability and keep the adversari...
Read More

Ransomware: The in-topic at the RSA Conference 2022

Cyber Secure India
RSA Conference 2022 at San Francisco, USA. RSA Conference, the world’s leading Information Security conferences and Expositions, after undergoing a...
Read More

Elders Beware, Online Gaming by Young Children can Lead to Losses: Policeman’s son loses Rs 36 lakh from Mother’s and Grandfather’s Accounts Through Mobile Game Addiction Behaviour

Cyber Secure India
A Teenager Boy Loses Rs 36 Lakhs by Playing Mobile Games. In a freak incident reported on 04 June 2022, at Hyderabad; a young 11th grade, 16-year...
Read More

Are mis-configured and mis-managed APIs a trouble for the CISOs

Cyber Secure India
APIs are CISOs’ Greatest Threat to Secure Operations. The Concept of API (Application Programming Interface) has been around in the IT industry ...
Read More

Government of India on the path in Setting up ‘‘India Data Management Office (IDMO)” and to bring out A New Data Governance Policy Framework

Cyber Secure India
GoI Inviting feedback and inputs on Draft National Data Governance Framework Policy The Government of India, Ministry of Electronics and Informati...
Read More

Cyber Attacks on Energy Sector: Strengthening of Defence of This Critical Infrastructure is Never Complete

Cyber Secure India
Strengthening of Defence Energy Sector against Cyber Attacks on Critical Infrastructure. Independent research specialised at risk evaluation of C...
Read More

The Next Generation XML Injection Attacks: What We Need to Know and How to Mitigate the Risk of XML Injection Attacks

Cyber Secure India
XML Injection Attacks and its different variants like XPath, XQuery, XXE & More............ Web Application and Mobile Applications have becom...
Read More

Auth Bypass Vulnerability Noticed: Advisory to Patch VMware Products

Cyber Secure India
VMware critical vulnerability should be patched or mitigated immediately. VMware users have been issued caution by the OEM for two prominent vulner...
Read More