Zooming Security Vulnerabilities [Part – 1]

6 years ago

Diving into Zoom Security Vulnerabilities [Part – 1]   Introduction - Zoom is a popular web-based video-conferencing application available to…

Organizations Hit by Maze Ransomware Attack !!

6 years ago

Introduction to Maze Ransomware - Maze ransomware is also known as ChaCha, is a ransomware that had been first discovered…

Containerization and It’s Impact on Enterprise Security

6 years ago

What’s this “D” word everyone is talking about? Oh.. you mean Docker!! The latest buzz word everyone is talking about…

Joanap and Brambul Malware

7 years ago

Joanap and Brambul Malware has come from North Korea that has infected numerous Microsoft Windows computers globally over the last…

Zero Knowledge Proof

7 years ago

Introduction Looking for something exciting and a secure way to protect your secrets? Zero Knowledge Proof Protocol has the potential…

Formjacking – The New Favourite Cyber Crooks Hack

7 years ago

“We are in the most popular world of – Black hat hacker”  What is Formjacking Attack? The year's rampant threat…

Best Practices – BYOD and Mobile Device Security

7 years ago

BYOD (Bring Your Own Device) is a practice where employees can bring their own devices such as laptops, tablets or…

Code Obfuscation

7 years ago

Abstract In this paper, we came up with a basic understanding of Code Obfuscation - A Code Protection Technology which…