OpenSSL Finds Patch For Heap Memory Corruption Vulnerability

July 12, 2022 - 4 mins read

Relief has flooded the users of the OpenSSL library as the sustainers of the project released patches to tackle a…

Cybersecurity and the Indian Cyber Laws

June 28, 2022 - 8 mins read

Cyber security is an abstract concept comprising everything from desktops to smartphones, software, web and mobile applications, clouds, servers, and…

NEW SEBI GUIDELINES MANDATE IN-DEPTH VAPT

June 21, 2022 - 7 mins read

SEBI has caused quite a stir in the cyber world recently with the release of its new guidelines and regulations…

Master Directions to NBFCs by RBI

June 14, 2022 - 7 mins read

We all know how crucial NBFCs are in encouraging inclusive growth in the country. Micro, small, and medium-sized businesses benefit…

NEW CERT-IN GUIDELINES FOR SECURITY BREACHES

May 2, 2022 - 6 mins read

How long does it take for a data breach to be detected? And how quickly can the organizations report the…

5 secure ways to configure a Firewall

April 26, 2022 - 7 mins read

Internet access is no longer an option; it has become a requirement for everyone. Internet connection has its own set…

“Advent of Cyber Security in Healthcare Industry”

April 19, 2022 - 6 mins read

Health Care Industry The cyber threat to the healthcare business has increased dramatically in recent years. This new era of…

SPRING4SHELL: THE NEW ADDITION TO THE TRENDING ZERO-DAY EXPLOITS

April 12, 2022 - 6 mins read

The news of a new Zero-day Vulnerability has the internet buzzing. With its high criticality threat level, Spring4Shell, or Spring…