Home Blog Page 99
Whenever we read about state-sponsored threat actors, the two countries that strike our minds are Russia and China. Government-motivated cybercriminal groups from these countries have been reportedly ruling the underground darknet markets with innovative attack techniques and malware campaigns. Cyberattacks...
Cybersecurity researchers discovered a new malware making rounds online via fake software sites that targeted popular service providers like Facebook, Google, Instagram, Amazon, and Apple. The undocumented malware, dubbed CopperStealer, is a specially crafted credentials and cookies stealer with...
Have you ever wondered why during the outbreak of war, it’s not just one of the armed forces that’s deployed — Army, Navy, Air Force, or Intelligence — but all of them? It’s the classic case of – “The...
In the times of remote working, ransomware attacks and cyberthreats are the #1 challenge faced by organizations today and are drawing attention to the pressing need for data protection and deploying multiple layers of security into the systems for smooth business continuity. Keeping...
Cybersecurity experts found cybercriminals leveraging DDoS booters to exploit misconfigured or outdated Datagram Transport Layer Security (D/TLS) servers to launch Distributed Denial of Service (DDoS) attacks. A D/TLS is a communications protocol that provides security to datagram-based applications and prevents eavesdropping, tampering, and message forgery in apps...
In the early noughties, the demand for IT professionals spiked in India. Becoming a software engineer and migrating to the United States was a goal for many. However, the recession in 2008 reduced the demand for human resources in...
As a country with the second-largest population and the third-largest economy, India-based organizations are a prime target for cybercriminals. Several cyberattacks have been reported on various industries and sectors in India that affected a large number of people in...
As the world celebrated womanhood and women’s contribution to society on International Women’s Day, we at CISO MAG decided to devote the month of March to all the women in cybersecurity. The purpose of this article is to highlight the...
Cybercriminals leverage several ways to illicitly obtain users’ login credentials and break into their systems. At the same time, poor password practices of users like reusing old passwords or using weak passwords make a hacker’s job easy. Despite continuous...
The API economy is on a growth trajectory in India with increased digitalization. As more Indian consumers began to work from home last year, they started expecting richer digital experiences. In response, Indian companies offering digital services or digital...