Importance of Cybersecurity and Data Protection in the Healthcare Industry
Digital technologies are transforming the industries and are now making a profound impact on healthcare industries as well. The global pandemic has also pushed them…
Top 10 Cybersecurity Threats
There is a significant shift in the digital landscape as people rely on the internet more and more across the globe. But unfortunately, it also…
Top 7 Cyber Security Measures That Enterprises Shouldn’t Neglect
India is considered the 3rd largest global hub with more than 5000 tech start-ups, and it is estimated that this number will grow 2.2x times…
The Rise of Phishing Attacks during the COVID-19 Pandemic
Cyberattacks are increasing in number every day due to the widespread use of mobile devices and the Internet. As data is considered a valuable asset…
Exploit Kits: Attackers Preferred Exploitation Tools
Exploit Kits: Overview Cybercrime was once the domain of a tiny handful of people with excellent technical skills who leveraged their abilities for malicious acts….
Brand Reputation
Brand Reputation: Brand reputation is the study of how a particular brand is viewed and perceived by the customers, clients, stakeholders, and the business groups….
Security Advisory – Typosquatting
There are multiple cases of redirect which are due to typing mistake (typos) from the users which leads to the threat of getting infected with…
Security Advisory – Tecnimont Cyber Theft
Tecnimont Cyber Theft – Security Advisory Background: Maire Tecnimont SpA is the parent company of the Italian group Maire Tecnimont, which consists of at…
Social Engineering and How It Helped Us Find A Mole
Social Engineering is essentially the art of influencing some person into doing things that he may or may not do willingly. It is not a concept…
Categories
- Android Security (19)
- Application security (1)
- Authentication & Authorization (23)
- Blockchain Security (1)
- Bug Bounty (2)
- BYOD (5)
- Case Study (29)
- Chatbot Security (1)
- Cloud Security (14)
- Containerization Security (1)
- Corporate Training (6)
- Cyber Attack (34)
- Cybersecurity Frameworks and Solutions (3)
- Data Breaches (35)
- Data Leakage (27)
- Data Privacy (29)
- Email Phishing (8)
- Encryption & Cryptography (14)
- Ethical Hacking (19)
- General (42)
- Governance Risk & Compliance (8)
- iOS Security (2)
- IOT Security (7)
- Java Security (2)
- Mobile Application Security (19)
- Mobile Device Management (10)
- Network Pentesting (9)
- News (48)
- Password Security (10)
- Past Events (8)
- Patch Management (3)
- Ransomware Attack (14)
- Reverse Engineering (3)
- Secure SDLC (5)
- Security Advisory (34)
- Security Best Practices (43)
- Security Hardening (38)
- Social Engineering Attack (10)
- Social Networking Security (5)
- Source Code Review (2)
- SPAM (2)
- Student Oriented Courses (2)
- Thick Client Penetration Testing (4)
- Unix/Linux Security (1)
- Upcoming Events (3)
- Viruses & Malware (16)
- VoIP Penetration Testing (4)
- Vulnerability Disclosure (21)
- Web Application Security (34)
- Windows Mobile Security (1)
- Zero Day Attack (8)