What is the Importance of Vulnerability Assessment?
Vulnerabilities are the anomalies, such as programming errors or configuration issues, of the IT infrastructure. Attackers exploit the weaknesses in…
Vulnerabilities are the anomalies, such as programming errors or configuration issues, of the IT infrastructure. Attackers exploit the weaknesses in…
Privileges refer to the permissions granted to a user or group of systems, allowing them to perform specific tasks. A…
Last two years have been loaded with incidents of data breach on the healthcare sector. However, AMCA data breach is one…
Bulgaria, an East European country, has suffered from the biggest data breach in its history that has resulted in the compromise…
em A decade ago, the ‘spray and pray’ method was extremely popular for sending out phishing emails. This involved sending…
A new encryption ransomware named Sodin (or Sodinokibi) or REvil has been discovered which exploits a vulnerability that has been…
In a recent incident of phishing attack, a hacker group has targeted Croatian government employees between the months of February…
Taiwan Ministry of Civil Service (MOCS) recently disclosed a security incident in a notice shared on their website which affected…