top of page

Join the Club
Join our email list and get access to specials deals exclusive to our subscribers.
Search


Understanding AI-Driven SOC
Security Operations Centers (SOCs) are at the forefront of modern defense against the relentless onslaught of cyber threats. SOC analysts...

Sadananda Sahoo
Aug 19, 20247 min read
Â
Â
Â


Effective Strategies for Implementing API Security
An application programming interface (API) regulates the making and handling of requests, allowing software programs to communicate with...

Sadananda Sahoo
Aug 17, 20248 min read
Â
Â
Â


Industrial firms experienced an increase in ransomware attacks during the second quarter of 2024.
According to Dragos, an industrial cybersecurity consultancy, the number of ransomware attacks on industrial enterprises increased...

Sadananda Sahoo
Aug 15, 20242 min read
Â
Â
Â


Updated BackConnect Module in IcedID Malware Expands Threat
The BackConnect (BC) module, which is utilized for post-compromise behavior on compromised computers, has been updated by threat actors...

Sadananda Sahoo
Jul 28, 20232 min read
Â
Â
Â


New AI Tool Empowers Cybercriminals to Launch Complex Cyberattacks: WormGPT
Given how popular generative artificial intelligence (AI) is right now, it may not come as a surprise that the technology has been...

Sadananda Sahoo
Jul 27, 20232 min read
Â
Â
Â


Building a Next-Generation Security Operations Center: A Guide for Everyone
Security Operations Center (SOC): what is it? The central place where a company's security staff regularly monitors and assesses its...

Sadananda Sahoo
Jul 27, 20236 min read
Â
Â
Â


A beginner's guide to the world of digital forensics!!
What Is Digital Forensics? Digital forensics is the practice of identifying, acquiring, and analyzing electronic evidence. Today almost...

Sadananda Sahoo
Jul 27, 20237 min read
Â
Â
Â


Threat from cyberattacks using infected USB drives has tripled in 2023
In the first half of 2023, the number of cyberattacks using infected USB infection drives as an initial access vector increased by...

Sadananda Sahoo
Jul 27, 20232 min read
Â
Â
Â


In Outlook desktop and web app , "display name" of email's "From" header can be manipulated
https://gitlab.com/email_bug/outlook_email_auth_bypass Outlook Desktop Description Two bugs in outlook makes it possible for the attacker...

Sadananda Sahoo
Jul 25, 20231 min read
Â
Â
Â


Tampa General Hospital half thwarts ransomware attack, but still loses patient data
The Tampa General Hospital (TGH) has promised to reach out to individuals whose information has been stolen by a ransomware group. In a...

Sadananda Sahoo
Jul 25, 20232 min read
Â
Â
Â
Norwegian government IT systems hacked using zero-day flaw
The Norwegian Data Protection Authority has also been notified about the cyberattack, indicating that the hackers might have accessed...

Sadananda Sahoo
Jul 25, 20231 min read
Â
Â
Â


Over 20,000 Citrix Appliances Vulnerable to New Exploit
Tracked as CVE-2023-3519 and patched last week, the critical-severity bug can be exploited to execute arbitrary code remotely, without...

Sadananda Sahoo
Jul 25, 20231 min read
Â
Â
Â
MOVEit Hack Could Earn Cybercriminals $100M as Number of Confirmed Victims Grows
Ransomware recovery company Coveware believes the Cl0p ransomware gang could earn as much as $100 million from the MOVEit hack, which has...

Sadananda Sahoo
Jul 25, 20232 min read
Â
Â
Â


MOVEit vulnerability and data extortion incident
A timeline of the #MOVEit #cyberattack June 1: MOVEit’s vulnerability is flagged by cyber security researchers and the US government....

Sadananda Sahoo
Jul 24, 20233 min read
Â
Â
Â
bottom of page