It is not uncommon for Threat Actors in the Cyber Domain, to use and at the same time abuse the Information Technology/ Communication Technolog... Read More
In any organisation that has adopted Information Technology or Information Communication Technology, the all-around protection of its networks and... Read More
The recent attacks on Corporate Entities through Cyber-Digital means, does cause considerable amount of damage to the Corporate House/OEMs/Profess... Read More
The ease of mobility and the ease of convergence, have made not only the Domestic Users of IT and ICT, but even the Enterprise Users, switch to th... Read More
Two CVEs (Common Vulnerabilities and Exposures) namely CVE-2022-27925 and CVE-2022-37042, where earlier reported and was targeted towards the Zimb... Read More
All India Institute of Medical Science (AIIMS), New Delhi, India was in the news in late November 2022, for a Cyber Attack that targeted them affe... Read More
Thales the French multinational company, which was earlier known as Thomson-CSF, finds its origin in 1968, the company was rebranded Thales (nam... Read More
The ISO/IEC 27001 has seen leaps and bounds from the erstwhile era of BS17799 to the present standard. The stringent nature and the difficulty ... Read More
A ‘Banking Trojan’ is a piece of malware that is used primarily to steal banking credentials by remotely installing malicious software on a vic... Read More
Joseph Sullivan, Joined Uber in Spring of year 2015 as its first CSO. This was the time when Uber was experiencing multiple safety and security ... Read More