1,10,000 Websites Compromised in Polyfill Supply Chain Attack
How well is the field of software supply chain security evolving in the year 2024? A BlackBerry research presented recently…
 71 Articles
Introduction Threat modeling is a process that aims to identify potential threats and their corresponding impact on an application or…
Introduction A Popular desktop software 3CX was compromised by threat actors because of a software supply chain attack that was…
Digitization is advancing along with technology, and online credit card purchases are commonplace. A set of network analysis and sniffing…
Introduction In today’s world, where people spend a significant portion of their time online, cyber threats are becoming increasingly sophisticated…
A recent notion, Web Skimming attacks, which have been around for a while, was introduced with the rise in cyber…
Introduction Recent incidents of data breaches have become a great concern for organizations. Regardless of the organization’s size, threat actors…
RedFoxtrot cyber threat group, which is believed to have links with the Chinese military, has been targeting Indian organizations since…
In my previous blog, I had described how and why it is important for critical agencies to ensure that they…