Eaton, a power management solutions provider had some severe vulnerabilities in its Intelligent power management (IPM) solution, which potentially allowed threat actors to penetrate and disrupt the power supply. Eaton has released patches to fix it.
Eaton’s IPM Vulnerabilities
Eaton’s IPM...
The adage “Apes Together Strong,” denotes apes working together for a common goal that would eventually benefit them. Similarly, several cybercriminal groups join hands to make their hacking attempts more intense and successful. Most of the threat actor groups...
The increasing use of cloud services and automation solutions or even the switch to remote work has made identity the new perimeter security. With the ever-expanding attack surface, identity management has become critical for maintaining a robust security posture....
The pandemic has given a lift to e-commerce platforms. Due to the social distancing norms, travel restrictions, and curfews, people all over the world found themselves more occupied with digital browsing. And this sparked an online shopping spree, changing...
The ransomware menace is spreading like wildfire. And while the law-and-order machinery seems to be putting out this fire, they seem to have been bearing the brunt of it too. The operators of the latest ransomware threat – Babuk...
A majority of industry experts agree that using password managers is the most secure way to protect your passwords. Password managers give an extra layer of protection to your online accounts by encrypting all your saved passwords. However, there...
The enforcement of GDPR Regulation has a far-reaching implication on businesses globally. The regulation does not just affect the way business is conducted but also has a direct impact on customer engagement. The EU Data Protection law requires all...
Cybercriminals around the world are taking advantage of the situation and offering everything from counterfeit vaccines to fake vaccination certificates, and test reports. In fact, state government authorities in India recently uncovered a racket where bus operators were offering...
Tech is not above us. It should be governed by all of us, by our democratic institutions. It should play by the rules of our societies. It should serve our needs, both individual and collective, as much as our...
The law enforcement and judicial authorities globally have geared up to takedown the infamous email spam botnet Emotet from all infected devices using a malware module. The Emotet botnet is responsible for various malware campaigns affecting multiple organizations over...














