COVID-19 and the Current Cyberthreat Landscape in India
It’s been over a year since the first COVID-19 death was reported in the state of Karnataka, India, in March 2020. With concerns of...
NSA Alerts About Four Critical Vulnerabilities in Microsoft Exchange Servers
The National Security Agency (NSA) informed Microsoft about four critical vulnerabilities that could be exploited by attackers to compromise Microsoft Exchange Servers remotely. The...
Global Median Dwell Time Drops Below One Month: FireEye Report
Global Median Dwell Time (defined as the duration between the start of a cyber intrusion and when it is identified) has been reducing over...
Identity Management Day: Here’s What Experts Have to Say
Research has pointed out that nearly 80% of organizations have faced some sort of security breach due to identity-related issues, even here nearly every...
Hackers Have an Appetite for Indian Power Companies
Tearing a page from the bad actor’s handbook was a recent China nation-state attack against 10 Indian power sector companies. Tensions between China and...
How to Remove Single Points of Failure from your Digital Infrastructure
On 24th August, 79AD, the eruption of Mount Vesuvius caught the 20,000 local residents of Pompeii off guard, burying the magnificent Roman trading town...
4 Common Attack Vectors You Need to Know
Online adversaries always advance their hacking techniques to enhance their attack vectors. Cybercriminal groups focus on different kinds of cyberthreats such as data breaches,...
CISO MAG’s April 2021 Issue Highlights Attack Vectors with COVID and Vaccine Themes
It would not be an exaggeration to say that COVID-19 vaccines are the most sought-after commodity today. Vaccine producers are working overtime to produce...
Cybersecurity Post-COVID: A New Era of Sophistication
2020 was an immensely challenging year for everyone, including the cybersecurity sector. An explosion in remote working endpoints and new technology investments brought about...
ICS is Becoming a Hot Favorite of Threat Actors: Kaspersky Report
ICS (Industrial Control System) or SCADA have faced large volumes of attacks from notorious threat actors in the recent past. Be it the China-linked...














