The term data breach refers to any misfortunate event where confidential information is exposed to unauthorized users. Such incidents not only cause life-damaging fines but also destroys an organization’s hard-earned reputation and trust. The digital landscape allows information to be scattered all over the place. Attackers are finding every way to access such information. The […]

Read More →

COVID19 has taught the world the powerful lessons on personal hygiene. Given that work from home culture is turning out to be the new norm and big organizations are already passing regulations on continuing it for the next few years, cyber hygiene is an important topic the world should be prepared to handle now. Whether […]

Read More →

As the world fights for its survival against COVID19, most of us are now extra conscious about our hygiene. During this tough situation isn’t it important to look after the asset hygiene as well? 2020 is a year to remember throughout life. Many things have happened and maybe a lot to expect in the upcoming […]

Read More →

COVID 19 has bought a lot of changes to the world. Various industries have evolved from their regular work pattern and have come up with new regulations to handle the wild spread of the pandemic. One of the important sectors to undergo this major transition would be the educational institutions. Moving from conventional classroom programs […]

Read More →

Fox Kitten Campaign has hit the headlines recently, but has a longstanding history of cyber espionage. Researchers from ClearSky discovered a three-year-old campaign targeting a wide range of organizations around the world. In a detailed report, the researchers added that this could be Iran’s most continuous and comprehensive campaign known. The campaign, first revealed by […]

Read More →

With just a week gone by after the Patch Tuesday, an anonymous researcher identified as SandboxEscaper found this to be the apt time to promulgate an exploit in Windows systems. This simple, yet efficient exploit could elevate privileges on a machine to allow modification of certain restricted files which are accessible only with administrator privileges. […]

Read More →

A new set of security vulnerabilities have put major tech giants and security researchers on the run. Just a set of software updates should be able to fix this. Isn’t it? The answer would be a yes and no. So let’s find out. The systems using Intel processors can be exploited using a set of […]

Read More →

It’s Microsoft Patch Tuesday again! And this time, the security updates have addressed a total of 79 vulnerabilities with 22 rated as critical and 57 rated as important. And yet again, a little more than half of the vulnerabilities lead to Remote Code Execution. It is worthy to note that the updates addressed an actively […]

Read More →

Image Credit: threatpost.com Description: A remote code execution vulnerability exists in Microsoft SharePoint. This vulnerability, tracked as CVE-2019-0604 was reported by Markus Wulftange. This vulnerability was rated critical. However, no exploits were seen at the time of release. Now, a number of organizations reported active exploits of this vulnerability in regions of Canada and Middle […]

Read More →

Oracle released the quarterly critical patch updates in April 2019. And in less than a week, a zero-day was found exploiting in-the-wild. The vulnerability exists in Oracle Weblogic Server which has been targeted repeatedly due to its popularity and access to huge business sensitive information. What is the issue? A remote code execution vulnerability exists […]

Read More →