Around 300,000 MikroTik Devices Vulnerable to Hacker Intrusions
Threat actors often prey on vulnerable devices to break into targeted networks. With most employees working remotely, cybercriminals increased their hacking attempts targeting vulnerable...
Hybrid Work Model and a Digital-first Economy Raise the Stakes on Cybersecurity
Disruption in the way we work has exploded in intensity and breadth since the onset of 2020. As India starts to see some semblance...
New Trojan ‘‘Android.Cynos.7.origin’’ Infects 9Mn Android Devices
Security researchers from Doctor Web have discovered a new Trojan that has infected over 9.3 million Android devices.
The Trojan, dubbed "Android.Cynos.7.origin," is a new...
How to Stay Digitally Safe This Black Friday and Cyber Monday
The onset of the festive season drives the retail market into a frenzy. After two years of being home-ridden and extra cautious due to...
Stolen Access Key Exposes Customer Data Stored in the Aruba Central Environment
HPE-owned Aruba has disclosed that an access key to the data repositories for their Aruba Central network monitoring platform was compromised, allowing an unauthorized...
Ransomware Operators Leverage Financial Events Like M&A to Pressurize Victims: FBI
The FBI released a notification identifying the use of critical financial events and stock valuation to facilitate targeting and extortion of victims by ransomware...
How to Know if Your Smartphone is Hacked?
Nowadays, it’s hard to find a person without a smartphone. With the ease of technology, the proliferation of smartphone culture has also brought in...
Cyberattacks Rise in APAC Region, India Most Targeted: Acronis Cyber Readiness Report
The comprehensive overview of the present cyberthreat landscape has changed drastically, with threat actors leveraging new hacking techniques more often. Besides, the pandemic gave...
“#BeingCyberSmart means picking the right battles and reducing the risks in the probable vectors”
October, being the National Cybersecurity Awareness Month, sees a flurry of initiatives across organizations to create awareness among employees for #BeingCyberSmart. The CISA and...
Hackers Use SSID Stripping to Trick Users Into Joining Rogue APs
With the evolution of new threat actors and their latest attack vectors, the cyberthreat landscape is larger than expected. Security experts from AirEye recently...