Data Breaches

Importance of Biometrics in Cybersecurity

Introduction Cybersecurity refers to safeguarding the systems, networks, and applications against digital attacks intended to gain access to, alter, or…

2 years ago

Code Injection Vulnerabilities

Introduction to Code Injection Vulnerabilities Code injection is an attack where the attacker tries to inject a code that can…

2 years ago

Dark Web Ads Offering Access to Corporate Networks

The rate of cybercrime increased in the first half of 2020 due to the pandemic. The total volume of cyber…

2 years ago

AWS Pentesting – Part – 1

Nowadays, we have experienced many data breaches exposing different vulnerabilities like s3 buckets, compromised AWS cloud environments, and many more…

3 years ago

Organizations Hit by Maze Ransomware Attack !!

Introduction to Maze Ransomware - Maze ransomware is also known as ChaCha, is a ransomware that had been first discovered…

4 years ago

Formjacking – The New Favourite Cyber Crooks Hack

“We are in the most popular world of – Black hat hacker”  What is Formjacking Attack? The year's rampant threat…

5 years ago

Security Advisory – Ransomware Attack Targeting China – December 2018

Ransomware Attack Targeting China - Security Advisory  1. Ransomware through Supply Chain Attack: A new ransomware strain spreading as a…

5 years ago

Security Advisory – Tecnimont Cyber Theft

Tecnimont Cyber Theft - Security Advisory   Background: Maire Tecnimont SpA is the parent company of the Italian group Maire…

5 years ago

Security Advisory – Saipem Cyber Attack by Shamoon Malware

Saipem Cyber Attack by Shamoon Malware 1. Introduction Saipem identified cyber-attack on Monday i.e. on 10th December 2018 that had…

5 years ago

Threat Advisory Report on Petya Ransomware (Critical Severity)

Threat Advisory Report on Petya Ransomware Attack (Critical Severity) Ransomware: An Introduction Ransomware is a form of malicious software that…

7 years ago