What is Web Application Security and Why it is Important
The emerging and advanced technologies in the digital age create new security challenges for cybersecurity specialists. The application security vulnerability is the latest threat...
Numando Banking Trojan Abuses YouTube, Pastebin and other Public Platforms
ESET Research spotted a banking Trojan Numando, as part of a series on Malware in Latin America. Numando, like its other malware families, uses...
6 Fundamental Skills Required to Pursue a Career in Digital Forensics
If you are interested in pursuing a digital forensics career, the time is ripe. Digital forensics is a lucrative career path to pursue in...
Cybersecurity Incidents Declined by 28% in FY 2020-21: ACSC Annual Cyber Threat Report
The government of Australia has implemented several cybersecurity measures to thwart rising cyberthreats in the nation. As a result, the country has now reported...
Hardening Cyber Insurance Market Makes Cybersecurity More than a Tech Problem
The hardening of the cyber insurance market is forcing enterprises to come to terms with the impact their cybersecurity posture has on the bottom...
Cybercrime in India Surges by 11.8% in 2020: NCRB
It’s not only about the new normal, but the pandemic is also the beginning of a new era in the cyberthreat landscape. The year...
Malware and Vulnerability Trends Report: High-risk Vulnerabilities in Corporate Software Frequently Targeted
Since devices are connected to the internet more than ever before, exploiting vulnerabilities to cross privilege boundaries has become common. Recently, Recorded Future and...
Microsoft Account Passwords Might Soon Be a Thing of the Past
Almost every cyberattack report mentions user credentials and passwords being stolen and sold on dark web forums. Be it ransomware, malware or any phishing...
Microsoft September 2021 Patch Tuesday: Mitigations and Workarounds
Microsoft released fixes for 60 security vulnerabilities in its latest September 2021 Patch Tuesday update. Out of 60 vulnerabilities, 56 were determined as important,...
6 Anti-Forensic Techniques That Every Digital Forensic Investigator Dreads
Anti-forensics techniques are designed to frustrate digital forensics investigators. They comprise tact and tools to hoodwink digital forensics investigation. Besides, cybercriminals use anti-forensics tools...














