Category :

 cyber attacks

 71 Articles

Protect future threats with Threat modeling

May 30, 2023 - 3 mins read

Introduction Threat modeling is a process that aims to identify potential threats and their corresponding impact on an application or…

An Overview of 3CX Supply Chain Attack

May 9, 2023 - 7 mins read

Introduction A Popular desktop software 3CX was compromised by threat actors because of a software supply chain attack that was…

R3NIN Sniffer Toolkit – A Complete Guide to New Sniffer

April 25, 2023 - 4 mins read

Digitization is advancing along with technology, and online credit card purchases are commonplace. A set of network analysis and sniffing…

Clipboard Hijacking Can Turn Your Copied Text into A Threat

March 28, 2023 - 5 mins read

Introduction In today’s world, where people spend a significant portion of their time online, cyber threats are becoming increasingly sophisticated…

“Web Skimming Attacks – Digital Hacking Techniques for Payment Card”

March 14, 2023 - 5 mins read

A recent notion, Web Skimming attacks, which have been around for a while, was introduced with the rise in cyber…

How Does a Data Breach Take Place in an Organization?

February 28, 2023 - 6 mins read

Introduction Recent incidents of data breaches have become a great concern for organizations. Regardless of the organization’s size, threat actors…

RedFoxtrot Targets Indian Organizations

June 21, 2021 - 2 mins read

RedFoxtrot cyber threat group, which is believed to have links with the Chinese military, has been targeting Indian organizations since…

Cyber Attack Haunts a Public Water Supply System. Again!

April 26, 2021 - 4 mins read

In my previous blog, I had described how and why it is important for critical agencies to ensure that they…