SOVA – A New Android Banking Trojan

November 2, 2022 - 6 mins read

How many people are aware of the new mobile banking “Trojan Virus -SOVA” that enables hackers to access legitimate logged-in…

OT Security Assessment of BMS

October 27, 2022 - 5 mins read

People are not aware that modern buildings are changing and have changed to an industrial control system. They are now…

A Way to Watering Hole Attack and its Exploitation Steps

October 11, 2022 - 5 mins read

How would you feel if your device was compromised after merely visiting a website? A watering hole attack is just…

5G and IoT for Intelligent Connectivity

October 6, 2022 - 6 mins read

How is the Internet of Things being expanded by 5G to create a better world? Do we all consider this…

Zero-Trust: The Latest Security Trend Of 2022

September 27, 2022 - 5 mins read

When there is a knock, ask “Who’s there? Every. Single. Time.” Cyberspace follows an unspoken rule – “When it comes…

Beef up your Cyber Protection with Multi Factor Authentication

September 13, 2022 - 6 mins read

“When it comes to security, Two-Factor Authentication proves to be a treasury full of gold.” The severity and frequency of…

“Top 6 Security Concerns for SaaS Industry”

August 23, 2022 - 7 mins read

As we know that modern organizations are moving away from traditional on-premises software and accompanying infrastructure in favor of software…

Android Application Hacking

August 9, 2022 - 9 mins read

The most widely used alternative for consumers to desktop software has evolved to be Android apps. Sensitive data is processed…