Overview Latest campaign of Maze ransomware has targeted and encrypted data from Berkine, a joint venture between Sonatrach, the state-owned oil company of Algeria, and the […]
Severity High Overview CISA informs of a cyber-attack that was launched recently, affecting control and communication assets on the operational technology (OT) network of a natural […]
Overview It is generally believed that data transfers are safest over a VPN connection. However, here is a bad news. They too are vulnerable and can […]
While bank customers have a blind faith on the technologically advanced machine called ATM, it’s cyber security measures have shocking lapses and loopholes in most cases. […]
Cyber security is a continuous evolutionary process as new threats arise everyday. Apart from advanced security measures, it is advised to follow the following basic steps […]
Overview Sophisticated cybercrimes are not originating from the outside world alone. There are threat actors within your environment too, who are also becoming tech savvy. After […]
Overview Why are most Phishing campaigns designed to steal user credentials? Because credentials are the easiest key to entering an organization’s virtual premises, unnoticed. However, most […]
Overview In a recent Capital One data breach, approximately 100 million individuals in the United States and approximately 6 million customers from Canada were affected. Capital […]