kalpadmin

Zooming Security Vulnerabilities [Part – 2]

This blog article will cover security best practices in setting up Zoom meetings securely to avoid Zooming Security Vulnerabilities!  …

5 years ago

Zooming Security Vulnerabilities [Part – 1]

Diving into Zoom Security Vulnerabilities [Part – 1]   Introduction - Zoom is a popular web-based video-conferencing application available to…

5 years ago

Organizations Hit by Maze Ransomware Attack !!

Introduction to Maze Ransomware - Maze ransomware is also known as ChaCha, is a ransomware that had been first discovered…

5 years ago

Containerization and It’s Impact on Enterprise Security

What’s this “D” word everyone is talking about? Oh.. you mean Docker!! The latest buzz word everyone is talking about…

6 years ago

Joanap and Brambul Malware

Joanap and Brambul Malware has come from North Korea that has infected numerous Microsoft Windows computers globally over the last…

6 years ago

Zero Knowledge Proof

Introduction Looking for something exciting and a secure way to protect your secrets? Zero Knowledge Proof Protocol has the potential…

7 years ago

Formjacking – The New Favourite Cyber Crooks Hack

“We are in the most popular world of – Black hat hacker”  What is Formjacking Attack? The year's rampant threat…

7 years ago

Best Practices – BYOD and Mobile Device Security

BYOD (Bring Your Own Device) is a practice where employees can bring their own devices such as laptops, tablets or…

7 years ago

Code Obfuscation

Abstract In this paper, we came up with a basic understanding of Code Obfuscation - A Code Protection Technology which…

7 years ago