Welcome to our weekly update blogs on key security news and issues oberved last week. Colonial Pipeline Ransomware Attack Colonial Pipeline, the operator of a major pipeline system that transports fuel from Texas to the East Coast said Saturday it had been victimized by a Ramsomware Attack and had halted all pipeline operations to deal with the attack. The company …
Read More »A Detailed Comparison of SASE and SSE Security Solutions
Security technologies have evolved rapidly, especially in response to the shift toward cloud service…
The Quantum Apocalypse: The End of Encryption?
The term “Quantum Apocalypse” might sound like the plot of a science fiction movie, but …
All about Surface, Deep and Dark Web
Skimming the surface The “Web” aka Internet can be a dangerous place. In the modern worl…
Doxing (Doxxing): Defined, Explained and tips to Stay Protected
What is Doxing? ‘Doxing’ popularly known as doxxing gets its name from the term “dropping dox,” or “…
Everything you need to know about DevSecOps
DevSecOps is significantly transforming IT organizations by effectively harnessing the full potentia…
What is a Firewall: Defined, Explained, and Explored
Security is paramount for modern networks, and a Firewall helps inject security by filtering the tra…
What is Fuzzing: Types, Advantages & Disadvantages
Fuzzing or Fuzz testing is increasingly getting popular and is used and advocated by some of the mos…
What are Web Cookies: Privacy, Security & Compliances
Cookies, also known as “Web Cookies” or “HTTP Cookies”, are widely used acro…
Types of Encryption: Defined, Explained & Explored
Cybercrimes are on the rise, and it’s comforting to know that there are methods to protect net…
Bluetooth attacks: BlueJacking, BlueSnarfing & BlueBugging
With the rapidly growing adoption of Bluetooth by portable devices and IoT devices primarily because…
Recent Posts
Hybrid Ransomware: Explained, Explored and Security Tips
This post will discuss Hybrid Ransomware and Ransomware in general and share some best practices and information around decrypting encrypted data. Ransomware is a favourite of Cybercriminals, and Ransomware attacks are on the rise. A recent cyber threat analysis by Deep Instinct observed that malware attacks increased by 358% overall in 2020, and Ransomware increased by 435% compared to 2019. …
Read More »Top 10 Cybersecurity Skills for 2021
Our list of top 10 Cybersecurity skills covers what is in demand and expected to continue being in demand for 2021 and beyond. All approximate salaries are for US Market 1. DevSecOps We see a growing demand of security professionals familiar with DevOps principles, who can collaborate effectively with software engineering teams. Often engineering departments are focused on bringing a …
Read More »The World This Week ( 26th April to 2nd May 2021)
Microsoft Sharepoint Targeted with Phishing Attacks Researchers at Cofense, discovered a phishing campaign which seems to be successfully passing the email defence and Secure Email Gateways including Microsoft. This phish attack is targeting Office 365 users with a SharePoint document that claims to be urgently in need of an email signature. Flubot is in the Air Malware Flubot (or Cabassous) …
Read More »The World this week (19th to 25th April, 2021)
The Internet was meant to make the world a smaller place. But it actually feels smaller without it — Transcendence – 2014 Above quote from character Max Waters feels more relevant today than ever. While the world is fighting Covid-19, the hackers and Cybercriminals are at work round the clock exploiting whatever they can. Apple Data Stolen from Manufacturer Quanta …
Read More »-
Bluetooth attacks: BlueJacking, BlueSnarfing & BlueBugging
With the rapidly growing adoption of Bluetooth by portable devices and IoT devices primarily because …
Read More » -
What is Spear Phishing: Defined, Explained, and Explored
-
What is Cryptojacking: Working, detection, & prevention
-
Complete guide to Botnets, and how to stay protected
-
All about Stalkerware: Protection, detection, and removal
-
A Detailed Comparison of SASE and SSE Security Solutions
Security technologies have evolved rapidly, especially in response to the shift toward cloud services and …
Read More » -
The Quantum Apocalypse: The End of Encryption?
-
All about Surface, Deep and Dark Web
-
Doxing (Doxxing): Defined, Explained and tips to Stay Protected
-
What are Web Cookies: Privacy, Security & Compliances
-
What is Fuzzing: Types, Advantages & Disadvantages
Fuzzing or Fuzz testing is increasingly getting popular and is used and advocated by some …
Read More » -
What is ARP Spoofing/Poisoning & tips for security
-
What is IP Spoofing: Defined, Explained & Explored
-
How to secure IoT devices: Challenges & Best Practices
-
How to secure REST API: Best practices and tips
-
Everything you need to know about DevSecOps
DevSecOps is significantly transforming IT organizations by effectively harnessing the full potential of DevOps. Fortune …
Read More » -
What is a Firewall: Defined, Explained, and Explored
-
Data Loss Prevention: DLP limitations and how to bypass?
-
What is a Black Hat Hacker: Types of Hackers
-
Types of Email Attacks: Defined, Explained, and Explored
-
Everything you need to know about DevSecOps
DevSecOps is significantly transforming IT organizations by effectively harnessing the full potential of DevOps. Fortune …
Read More » -
What is a Firewall: Defined, Explained, and Explored
-
Data Loss Prevention: DLP limitations and how to bypass?
-
What is a Black Hat Hacker: Types of Hackers
-
Types of Email Attacks: Defined, Explained, and Explored
-
The World This Week (May 17th to May 23, 2021)
According to a Bloomberg Report on Friday, CNA Financials has paid a Ransom of 40 …
Read More » -
The world this week (10th to 16th May 2021)
-
The World This Week (3rd May to 9th May 2021)
-
Bluetooth attacks: BlueJacking, BlueSnarfing & BlueBugging
With the rapidly growing adoption of Bluetooth by portable devices and IoT devices primarily because …
Read More » -
What is Spear Phishing: Defined, Explained, and Explored
-
What is Cryptojacking: Working, detection, & prevention
-
The Quantum Apocalypse: The End of Encryption?
The term “Quantum Apocalypse” might sound like the plot of a science fiction movie, but …
Read More » -
Types of Encryption: Defined, Explained & Explored
-
What is Web Scraping: security tips and how to?
-
Doxing (Doxxing): Defined, Explained and tips to Stay Protected
-
What are Web Cookies: Privacy, Security & Compliances