In recent times threat actors used data scraping methods to extract confidential data in a faster and efficient way like it was observed in the case of Facebook and Linkedin which was later put to sale on Dark Web.
Read More »A Detailed Comparison of SASE and SSE Security Solutions
Security technologies have evolved rapidly, especially in response to the shift toward cloud service…
The Quantum Apocalypse: The End of Encryption?
The term “Quantum Apocalypse” might sound like the plot of a science fiction movie, but …
All about Surface, Deep and Dark Web
Skimming the surface The “Web” aka Internet can be a dangerous place. In the modern worl…
Doxing (Doxxing): Defined, Explained and tips to Stay Protected
What is Doxing? ‘Doxing’ popularly known as doxxing gets its name from the term “dropping dox,” or “…
Everything you need to know about DevSecOps
DevSecOps is significantly transforming IT organizations by effectively harnessing the full potentia…
What is a Firewall: Defined, Explained, and Explored
Security is paramount for modern networks, and a Firewall helps inject security by filtering the tra…
What is Fuzzing: Types, Advantages & Disadvantages
Fuzzing or Fuzz testing is increasingly getting popular and is used and advocated by some of the mos…
What are Web Cookies: Privacy, Security & Compliances
Cookies, also known as “Web Cookies” or “HTTP Cookies”, are widely used acro…
Types of Encryption: Defined, Explained & Explored
Cybercrimes are on the rise, and it’s comforting to know that there are methods to protect net…
Bluetooth attacks: BlueJacking, BlueSnarfing & BlueBugging
With the rapidly growing adoption of Bluetooth by portable devices and IoT devices primarily because…
Recent Posts
Is Passwordless Authentication the Future?
“True Cybersecurity is preparing for what’s next, not what was last” – Neil Rerup, Cybersecurity Expert Passwordless authentication is widely regarded as the future of authentication. Passwords actually do more harm than good. Yes, you heard it right. Research says that an average internet user has more than 90 online accounts. Think about all the online accounts you have created for …
Read More »Darkside is gone, but Who did it?
On may 14th, 2021, a message from a cybercrime forum believed to be from Darkside Admin read. A few hours ago, we lost access to the public part infrastructure namely the: Blog. Payment Server. DOS Servers. Now these servers are unavailable by SSH, the hosting panels are blocked. Hosting support, apart from information “at the request of law enforcement agencies,” …
Read More »The world this week (10th to 16th May 2021)
Last week we reported the colonial pipeline Ransomware Attack which eventually disrupted the operations for around 6 days and made the pipeline cough up $5 Million in Ransom. Darkside Ransomware Service, responsible for the attack has reportedly announced the closure of their affiliate program. DarkSide also said, they are releasing decryption tools for all of the companies that have been …
Read More »Dridex Malware is the Most Dreaded in April 2021
Dridex malware which has been hitting news in the last decade for different reasons is back in the news again. Dridex is also known as Bugat and Cridex. Checkpoint Research in a recent report highlighted that Dridex has maintained it’s position on the top of malware list in the month of April, 2021 with a global impact to 15% of …
Read More »-
Bluetooth attacks: BlueJacking, BlueSnarfing & BlueBugging
With the rapidly growing adoption of Bluetooth by portable devices and IoT devices primarily because …
Read More » -
What is Spear Phishing: Defined, Explained, and Explored
-
What is Cryptojacking: Working, detection, & prevention
-
Complete guide to Botnets, and how to stay protected
-
All about Stalkerware: Protection, detection, and removal
-
A Detailed Comparison of SASE and SSE Security Solutions
Security technologies have evolved rapidly, especially in response to the shift toward cloud services and …
Read More » -
The Quantum Apocalypse: The End of Encryption?
-
All about Surface, Deep and Dark Web
-
Doxing (Doxxing): Defined, Explained and tips to Stay Protected
-
What are Web Cookies: Privacy, Security & Compliances
-
What is Fuzzing: Types, Advantages & Disadvantages
Fuzzing or Fuzz testing is increasingly getting popular and is used and advocated by some …
Read More » -
What is ARP Spoofing/Poisoning & tips for security
-
What is IP Spoofing: Defined, Explained & Explored
-
How to secure IoT devices: Challenges & Best Practices
-
How to secure REST API: Best practices and tips
-
Everything you need to know about DevSecOps
DevSecOps is significantly transforming IT organizations by effectively harnessing the full potential of DevOps. Fortune …
Read More » -
What is a Firewall: Defined, Explained, and Explored
-
Data Loss Prevention: DLP limitations and how to bypass?
-
What is a Black Hat Hacker: Types of Hackers
-
Types of Email Attacks: Defined, Explained, and Explored
-
Everything you need to know about DevSecOps
DevSecOps is significantly transforming IT organizations by effectively harnessing the full potential of DevOps. Fortune …
Read More » -
What is a Firewall: Defined, Explained, and Explored
-
Data Loss Prevention: DLP limitations and how to bypass?
-
What is a Black Hat Hacker: Types of Hackers
-
Types of Email Attacks: Defined, Explained, and Explored
-
The World This Week (May 17th to May 23, 2021)
According to a Bloomberg Report on Friday, CNA Financials has paid a Ransom of 40 …
Read More » -
The world this week (10th to 16th May 2021)
-
The World This Week (3rd May to 9th May 2021)
-
Bluetooth attacks: BlueJacking, BlueSnarfing & BlueBugging
With the rapidly growing adoption of Bluetooth by portable devices and IoT devices primarily because …
Read More » -
What is Spear Phishing: Defined, Explained, and Explored
-
What is Cryptojacking: Working, detection, & prevention
-
A Detailed Comparison of SASE and SSE Security Solutions
Security technologies have evolved rapidly, especially in response to the shift toward cloud services and …
Read More » -
What are Web Cookies: Privacy, Security & Compliances
-
What is Web Scraping: security tips and how to?
-
Doxing (Doxxing): Defined, Explained and tips to Stay Protected
-
How to secure Docker Containers: Tips and cheats