“AI and ML Will Be Enablers for Cybersecurity for the Foreseeable Future”
In the first half of 2021, cyber adversaries pried on opportunities to attack enterprise infrastructure and critical industries. Even the slightest security mismanagement motivated...
Cybersecurity is a Low Priority for India’s Private Sector
In the movie Die Hard 4.0, John McClane and a young hacker team up to thwart the plans of cyber-terrorist Thomas Gabriel in Washington...
Trickbot Remains the Most Prevalent Malware
The evolution of new malware variants has become prevalent in the cyberthreat landscape. Cybercriminals continue to create novel malicious codes, botnets, or redesign old...
Costco Store Payment Terminal Breached by Data Skimmer
Costco Wholesale Corporation, a big-box retail store company, discovered a breach at one of its retail store terminals where a card skimming device was...
HTML Smuggling – A Novel Malware Deploying Technique
Like creating various malware variants, cybercriminals often find new techniques to deploy malware and evade security scans. As per a report from Microsoft 365...
3 Steps Businesses Can Take to Protect Themselves From Software Supply Chain Attacks
In August, the White House hosted a meeting with some of the most powerful CEOs in the world; from Apple to JPMorgan. The topic...
Sideloading: A New Malware Delivery Method via Spam Email
Cybercriminals often rely on different malware campaigns to exploit new vulnerabilities and break into critical network systems. The latest security research from the Mimecast...
Nucleus:13 – Critical Vulnerabilities Found Affecting the Nucleus TCP/IP Stack
Researchers at Forescout Research Labs, with support from Medigate Labs, discovered vulnerabilities affecting Nucleus TCP/IP stack, a software that powers devices across the health...
DDoS Attack on VoIP Provider Telnyx Impacts Global Telephony Services
Cybercriminals often leverage Distributed Denial of Services (DDoS) techniques to disrupt critical services of global organizations. Days after a massive DDoS attack on multiple...
Cloud Computing Security 2022: Upgrading the Cloud to Make Infosec Efficacious
Cloud computing security (CCS) is an essential aspect for businesses when securing virtual data, however, like any other domain within IT security, it comes...














