The advent of cloud computing gave rise to hyper connectivity and constant availability. Data could not only be stored on […]
The advent of cloud computing gave rise to hyper connectivity and constant availability. Data could not only be stored on […]
SitePoint is an online portal which provides some great tutorials on web development. It recently went through a security breach […]
SolarWinds, an IT services company, recently faced issue with their email security. Sudhakar Ramakrishna, CEO SolarWinds, suspects a zero-day vulnerability […]
Case Specifics A private company based in Pune recently suffered from a server hack. The hackers, who remain as of […]
Cyber security firm themselves are lucrative targets for hackers. It is a matter of pride for them; their way of […]
It is true that most common cyber attacks leverage gaps in technical devices or technological aspects a business uses, to […]
Haryana hackers defrauded ISGEC Heavy Engineering company and nicked an amount of INR 1.05 crore. These hackers intruded upon ISGEC’s […]
Microsoft is under the gun again for cyber fraud. 200 million+ users are at a risk of O365 email spoofing […]
In a previous blog, we explored various concepts associated with network security. If you haven’t already, we highly recommend reading […]
Communication to and from devices essentially happens via networks. That network can be private (within an organization) or public (via […]