What is the Importance of Vulnerability Assessment?
Vulnerabilities are the anomalies such as programming errors or configuration issues of the system. Attackers exploit the weaknesses in the…
Information Hub For Cyber Security Experts
Vulnerabilities are the anomalies such as programming errors or configuration issues of the system. Attackers exploit the weaknesses in the…
Privileges are the permissions or right given to the user or group of systems for performing tasks that are needed…
Bulgaria, an East European country, has suffered from the biggest data breach in its history that has resulted in the compromise…
em A decade ago, the ‘spray and pray’ method was extremely popular for sending out phishing emails. This involved sending…
A new encryption ransomware named Sodin (or Sodinokibi) or REvil has been discovered which exploits a vulnerability that has been…
In a recent incident of phishing attack, a hacker group has targeted Croatian government employees between the months of February…
Taiwan Ministry of Civil Service (MOCS) recently disclosed a security incident in a notice shared on their website which affected…
Not even half the year has passed; cyber-attacks have already terrorized the world. However, attack vectors like Phishing and Ransomware…