There are multiple cases of redirect which are due to typing mistake (typos) from the users which leads to the…
Here are some best practices to harden office 365 and ensure your data remains protected. 1. Password Policy It is…
Ransomware Attack Targeting China - Security Advisory 1. Ransomware through Supply Chain Attack: A new ransomware strain spreading as a…
Tecnimont Cyber Theft - Security Advisory Background: Maire Tecnimont SpA is the parent company of the Italian group Maire…
Saipem Cyber Attack by Shamoon Malware 1. Introduction Saipem identified cyber-attack on Monday i.e. on 10th December 2018 that had…
In this blog we are going to discuss about Microsoft Zero Day - VCard Vulnerability For Windows operating system. Introduction…
“Hello Alexa, may I have a strategy to test you? “ What is ChatBot? A computer program designed to…
Blockchain is both a strength and a concern. Know basics of blockchain and blockchain security security practices to make it…
At present, the web services have turned into an integral portion of the both mobile and web applications. Because the…