TYPE-CONFUSION: THE NEW ZERO-DAY VULNERABILITY PLAGUING GOOGLE’S CHROME

April 5, 2022 - 6 mins read

Zero-day exploits have set a trend recently with their growing reported cases coming into the light. Even though there is…

Guidelines on Network Infrastructure Security

March 21, 2022 - 4 mins read

Has anyone noticed that IT is no longer the same as it was a few years ago? Apart from IT…

Ransomware as a Service: A Thriving Business for Hackers

January 28, 2022 - 6 mins read

Ransomware as a service has become quite a popular and profitable business for cybercriminals. These cybercriminals often collaborate with malware…

Corporate Employee Snooping: How to Address This Threat?

January 27, 2022 - 6 mins read

For every organization, the data in its possession is one of its most valuable assets. The ever-increasing number of class…

Data Privacy Day: Save the Date, Save the Data

January 26, 2022 - 6 mins read

“The main goal of Data Privacy Day and Data Protection is to raise awareness about the protection of personal data…

AMAZON S3 BUCKET – A Quick Overview

January 21, 2022 - 4 mins read

In the last few years, Amazon S3 buckets have been linked to around 16 percent of cloud security breaches. (https://www.helpnetsecurity.com/2020/02/20/cloud-misconfigurations/).…

Ransomware Detection Through Threat Hunting

January 14, 2022 - 6 mins read

Ransomware is the most destructive kind of cyber attack due to the massive financial losses it inflicts on organisations worldwide.…

7 Security Coding Guidelines to Keep in Mind

January 13, 2022 - 4 mins read

Are you aware of the coding strategies used by developers? There will be fewer security flaws and better leads if…