Over the past decade, the medical care structure has been turning to total digitalization and utilizing technology to strengthen the quality and effectiveness of medical treatment and health care delivery. Patients can contact their doctors from anywhere using their...
Researchers from EYE discovered a hardcoded credential vulnerability in Zyxel’s firewalls, VPN gateways, and access point controllers that could allow attackers root access to devices through the SSH interface or the web administration panel. According to EYE’s security researcher...
Juspay, a Bengaluru-based startup, is a payment partner for many Indian online platforms, including Amazon, Swiggy, and Makemytrip. It has been in business for the past eight years, and every Indian feels safe about online transactions while using Juspay....
Researchers from security firm ThreatNix found threat actors abusing Facebook ads in a massive phishing campaign to steal users’ login credentials. They stated that cybercriminals are using Github pages to exploit Facebook ads and redirect users to phishing pages....
Researchers from security firm Cyble stated they discovered threat actors selling more than 200 million records of Chinese Citizens on darknet forums. In a security release, the researchers stated that they found a massive amount of personal information related...
Microsoft has issued an update about its ongoing internal investigation of the SolarWinds hack that had reportedly compromised a few of its internal systems. The tech giant has now confirmed that it traced a compromised account used to “view...
Ticketmaster L.L.C., the U.S.-based ticket sales and distribution firm, has agreed to pay a $10 million fine to settle a class-action lawsuit with the U.S. Attorney’s Office for the Eastern District of New York for illicitly breaking into a...
EDITORIAL: We welcome all our readers back to work, on the first working day of the year! And we hope that 2021 will be a much better year for you. Here are some of the Cybersecurity trends you can...
On the surface, a Red Team exercise appears like a scene straight out of a Hollywood movie. Spies masquerading as employees walking straight into the office so instinctively that no one bats an eye. Plugging things into your devices...
“Digital” and “Data” were the two words heard loud and clear in 2020. Digital transformation drove data collection and subsequently gave rise to the flipside of this blessing – data theft. Cybercriminals had a gala time stealing it and...














