What is the Importance of Vulnerability Assessment?

August 7, 2019 - 4 mins read

Vulnerabilities are the anomalies such as programming errors or configuration issues of the system. Attackers exploit the weaknesses in the…

How VAPT Prevents Privilege Escalation Attacks?

August 2, 2019 - 4 mins read

Privileges are the permissions or right given to the user or group of systems for performing tasks that are needed…

Bulgaria suffers from the biggest data breach in its history

July 19, 2019 - 3 mins read

Bulgaria, an East European country, has suffered from the biggest data breach in its history that has resulted in the compromise…

UK becomes the biggest victim of a newer form of Phishing attack!

July 18, 2019 - 3 mins read

em A decade ago, the ‘spray and pray’ method was extremely popular for sending out phishing emails. This involved sending…

Sodin ransomware leverages the vulnerabilities present in Windows

July 8, 2019 - 4 mins read

A new encryption ransomware named Sodin (or Sodinokibi) or REvil has been discovered which exploits a vulnerability that has been…

Croatian government gets victimized by spear phishing attack

July 6, 2019 - 3 mins read

In a recent incident of phishing attack, a hacker group has targeted Croatian government employees between the months of February…

Taiwan’s Ministry of Civil Service suffers from a massive data breach

July 2, 2019 - 2 mins read

Taiwan Ministry of Civil Service (MOCS) recently disclosed a security incident in a notice shared on their website which affected…

Mind boggling ransomware attacks in the last six months

June 21, 2019 - 4 mins read

Not even half the year has passed; cyber-attacks have already terrorized the world. However, attack vectors like Phishing and Ransomware…