Business demands are driving a surge of enterprise endpoints. The average IT asset inventory is constantly growing with remote and heterogeneous devices used by multiple employees. While businesses take longer strides and step into bigger opportunities, it is essential to secure all the endpoints that keep the business running. According to a study, 30 percent […]

Read More →

The year is almost coming to an end. We’ve been practicing good personal hygiene at home, offices, and everywhere else to protect our loved ones. While we’ve been confined to our homes, crossing our fingers, and hoping the pandemic comes to an end, the dark underbelly of cyberspace has quietly grown its reaches far wide.  […]

Read More →

The term data breach refers to any misfortunate event where confidential information is exposed to unauthorized users. Such incidents not only cause life-damaging fines but also destroys an organization’s hard-earned reputation and trust. The digital landscape allows information to be scattered all over the place. Attackers are finding every way to access such information. The […]

Read More →

COVID19 has taught the world the powerful lessons on personal hygiene. Given that work from home culture is turning out to be the new norm and big organizations are already passing regulations on continuing it for the next few years, cyber hygiene is an important topic the world should be prepared to handle now. Whether […]

Read More →

As the world fights for its survival against COVID19, most of us are now extra conscious about our hygiene. During this tough situation isn’t it important to look after the asset hygiene as well? 2020 is a year to remember throughout life. Many things have happened and maybe a lot to expect in the upcoming […]

Read More →

COVID 19 has bought a lot of changes to the world. Various industries have evolved from their regular work pattern and have come up with new regulations to handle the wild spread of the pandemic. One of the important sectors to undergo this major transition would be the educational institutions. Moving from conventional classroom programs […]

Read More →

Fox Kitten Campaign has hit the headlines recently, but has a longstanding history of cyber espionage. Researchers from ClearSky discovered a three-year-old campaign targeting a wide range of organizations around the world. In a detailed report, the researchers added that this could be Iran’s most continuous and comprehensive campaign known. The campaign, first revealed by […]

Read More →

With just a week gone by after the Patch Tuesday, an anonymous researcher identified as SandboxEscaper found this to be the apt time to promulgate an exploit in Windows systems. This simple, yet efficient exploit could elevate privileges on a machine to allow modification of certain restricted files which are accessible only with administrator privileges. […]

Read More →

A new set of security vulnerabilities have put major tech giants and security researchers on the run. Just a set of software updates should be able to fix this. Isn’t it? The answer would be a yes and no. So let’s find out. The systems using Intel processors can be exploited using a set of […]

Read More →

It’s Microsoft Patch Tuesday again! And this time, the security updates have addressed a total of 79 vulnerabilities with 22 rated as critical and 57 rated as important. And yet again, a little more than half of the vulnerabilities lead to Remote Code Execution. It is worthy to note that the updates addressed an actively […]

Read More →