Security Advisory

Zooming Security Vulnerabilities [Part – 2]

This blog article will cover security best practices in setting up Zoom meetings securely to avoid Zooming Security Vulnerabilities!  …

4 years ago

Zooming Security Vulnerabilities [Part – 1]

Diving into Zoom Security Vulnerabilities [Part – 1]   Introduction - Zoom is a popular web-based video-conferencing application available to…

4 years ago

Organizations Hit by Maze Ransomware Attack !!

Introduction to Maze Ransomware - Maze ransomware is also known as ChaCha, is a ransomware that had been first discovered…

4 years ago

Containerization and It’s Impact on Enterprise Security

What’s this “D” word everyone is talking about? Oh.. you mean Docker!! The latest buzz word everyone is talking about…

5 years ago

Joanap and Brambul Malware

Joanap and Brambul Malware has come from North Korea that has infected numerous Microsoft Windows computers globally over the last…

5 years ago

Best Practices – BYOD and Mobile Device Security

BYOD (Bring Your Own Device) is a practice where employees can bring their own devices such as laptops, tablets or…

5 years ago

Security Advisory – Typosquatting

There are multiple cases of redirect which are due to typing mistake (typos) from the users which leads to the…

5 years ago

Security Advisory – Ransomware Attack Targeting China – December 2018

Ransomware Attack Targeting China - Security Advisory  1. Ransomware through Supply Chain Attack: A new ransomware strain spreading as a…

5 years ago

Security Advisory – Tecnimont Cyber Theft

Tecnimont Cyber Theft - Security Advisory   Background: Maire Tecnimont SpA is the parent company of the Italian group Maire…

5 years ago