The Emergence Of BYOD: Are Personal Devices Acceptable?

August 30, 2022 - 6 mins read

To bring or not to ‘bring your own device’ to work, that is the question! During COVID-19, when organizations were…

“Top 6 Security Concerns for SaaS Industry”

August 23, 2022 - 7 mins read

As we know that modern organizations are moving away from traditional on-premises software and accompanying infrastructure in favor of software…

Types of Testing Techniques: Black, White and Grey Box

August 17, 2022 - 7 mins read

One cannot argue against the need for quality assurance when it comes to software development. An organization’s reputation can be…

Android Application Hacking

August 9, 2022 - 9 mins read

The most widely used alternative for consumers to desktop software has evolved to be Android apps. Sensitive data is processed…

Risk Assessment: The Crucial Element Of A Successful Security Implementation Program

August 2, 2022 - 6 mins read

The advancement of technology leaves no scope for negligence when it comes to data protection. Organizations, understanding the urgency of…

PolicyBazaar: Cyberattack Breaches IT System, No Significant Data Lost

July 27, 2022 - 6 mins read

PB Fintech, Policybazaar’s parent company, reported a data breach on July 19, 2022 when certain vulnerabilities in a part of…

Flipkart’s Cleartrip Struck By A Major Data Breach, Customer Records Leaked!

July 21, 2022 - 6 mins read

Cleartrip, Flipkart’s popular travel booking website, has confirmed a major data breach on July 18, 2022, after the hackers claimed…

Retbleed: Spectre-BTI Family’s Newborn Strikes Intel, AMD

July 19, 2022 - 5 mins read

A new research has uncovered a unique attack tactic exploiting speculation execution to bypass the current defenses in the AMD…

OpenSSL Finds Patch For Heap Memory Corruption Vulnerability

July 12, 2022 - 4 mins read

Relief has flooded the users of the OpenSSL library as the sustainers of the project released patches to tackle a…

Cybersecurity and the Indian Cyber Laws

June 28, 2022 - 8 mins read

Cyber security is an abstract concept comprising everything from desktops to smartphones, software, web and mobile applications, clouds, servers, and…

Recent Blogs