Prevention – The Befuddled Concept
There are only two distinct defenses in cyber security – proactive and reactive. Proactive defense refers to actions that prevent…
Learn the advanced automation practices in IT security technology and combat attacks effectively.
There are only two distinct defenses in cyber security – proactive and reactive. Proactive defense refers to actions that prevent…
Intel has recently disclosed a short advisory with details of high severity for 3 CVEs here. They are CVE-2021-0157, CVE-2021-0158, and…
The term data breach refers to any misfortunate event where confidential information is exposed to unauthorized users. Such incidents not…
Fox Kitten Campaign has hit the headlines recently, but has a longstanding history of cyber espionage. Researchers from ClearSky discovered…
With just a week gone by after Patch Tuesday, an anonymous researcher identified as SandboxEscaper found this to be the…
A new set of security vulnerabilities have put major tech giants and security researchers on the run. Just a set…
It's Microsoft Patch Tuesday May 2019 again! And this time, the security updates have addressed a total of 79 vulnerabilities…
Image Credit: threatpost.com A remote code execution vulnerability exists in Microsoft SharePoint. This vulnerability, tracked as CVE-2019-0604 was reported by…
Oracle released the quarterly critical patch updates in April 2019. And in less than a week, a zero-day (CVE-2019-2725) was…
While we all breathed a sigh of relief after patching our systems against the two zero-days reported in the April…