top of page

Join the Club
Join our email list and get access to specials deals exclusive to our subscribers.
Search


Understanding AI-Driven SOC
Security Operations Centers (SOCs) are at the forefront of modern defense against the relentless onslaught of cyber threats. SOC analysts...

Sadananda Sahoo
Aug 19, 20247 min read
43 views
0 comments


Effective Strategies for Implementing API Security
An application programming interface (API) regulates the making and handling of requests, allowing software programs to communicate with...

Sadananda Sahoo
Aug 17, 20248 min read
35 views
0 comments


Industrial firms experienced an increase in ransomware attacks during the second quarter of 2024.
According to Dragos, an industrial cybersecurity consultancy, the number of ransomware attacks on industrial enterprises increased...

Sadananda Sahoo
Aug 15, 20242 min read
9 views
0 comments


Updated BackConnect Module in IcedID Malware Expands Threat
The BackConnect (BC) module, which is utilized for post-compromise behavior on compromised computers, has been updated by threat actors...

Sadananda Sahoo
Jul 28, 20232 min read
16 views
0 comments


New AI Tool Empowers Cybercriminals to Launch Complex Cyberattacks: WormGPT
Given how popular generative artificial intelligence (AI) is right now, it may not come as a surprise that the technology has been...

Sadananda Sahoo
Jul 27, 20232 min read
6 views
0 comments


Building a Next-Generation Security Operations Center: A Guide for Everyone
Security Operations Center (SOC): what is it? The central place where a company's security staff regularly monitors and assesses its...

Sadananda Sahoo
Jul 27, 20236 min read
27 views
0 comments


A beginner's guide to the world of digital forensics!!
What Is Digital Forensics? Digital forensics is the practice of identifying, acquiring, and analyzing electronic evidence. Today almost...

Sadananda Sahoo
Jul 27, 20237 min read
20 views
0 comments


Threat from cyberattacks using infected USB drives has tripled in 2023
In the first half of 2023, the number of cyberattacks using infected USB infection drives as an initial access vector increased by...

Sadananda Sahoo
Jul 27, 20232 min read
8 views
0 comments


In Outlook desktop and web app , "display name" of email's "From" header can be manipulated
https://gitlab.com/email_bug/outlook_email_auth_bypass Outlook Desktop Description Two bugs in outlook makes it possible for the attacker...

Sadananda Sahoo
Jul 25, 20231 min read
11 views
0 comments


Tampa General Hospital half thwarts ransomware attack, but still loses patient data
The Tampa General Hospital (TGH) has promised to reach out to individuals whose information has been stolen by a ransomware group. In a...

Sadananda Sahoo
Jul 25, 20232 min read
12 views
0 comments
Norwegian government IT systems hacked using zero-day flaw
The Norwegian Data Protection Authority has also been notified about the cyberattack, indicating that the hackers might have accessed...

Sadananda Sahoo
Jul 25, 20231 min read
11 views
0 comments


Over 20,000 Citrix Appliances Vulnerable to New Exploit
Tracked as CVE-2023-3519 and patched last week, the critical-severity bug can be exploited to execute arbitrary code remotely, without...

Sadananda Sahoo
Jul 25, 20231 min read
5 views
0 comments
MOVEit Hack Could Earn Cybercriminals $100M as Number of Confirmed Victims Grows
Ransomware recovery company Coveware believes the Cl0p ransomware gang could earn as much as $100 million from the MOVEit hack, which has...

Sadananda Sahoo
Jul 25, 20232 min read
8 views
0 comments


MOVEit vulnerability and data extortion incident
A timeline of the #MOVEit #cyberattack June 1: MOVEit’s vulnerability is flagged by cyber security researchers and the US government....

Sadananda Sahoo
Jul 24, 20233 min read
7 views
0 comments
bottom of page