Blog

Research entries on relevant and emerging
cyber attacks, security vulnerabilities and exploits,
concepts and techniques involved in designing, and so on.

Featured Article

  • All
  • Artificial Intelligence
  • Engineering
  • Machine Learning
  • Security
  • Vulnerability

Cyber Trivia Friday is here! Find out if you’re up-to-date on your cybersecurity news from across the world. If you’re behind on the news, fret not. We’ve sprinkled in some hints to help you along. We will select 3 people in random who submitted the quiz and got all 10 questions right. Prize: Amazon Vouchers…

In 2018, high risk vulnerabilities were found in 43% Android apps. These are the security flaws that users and developers commonly encounter.

Security professionals, government agencies trust Shodan to alert them on unmanaged IoT devices. Learn more about Shodan and its working.

We delve into the mechanical structure and sensory faculties of the humanoid Herbie, which is a Socially Assistive Robot that is built to assist children with Cerebral Palsy.

Monitoring ML models is a daunting task and yet indispensable. Here’s how CloudSEK deploys and monitors its 50+ different ML models.

It is imperatvie to develop computational methods to audit and debug complex and opaque ML models that deliver incoherent outputs.

Cyber Trivia Friday is here! In our first-ever cyber quiz, we want to find out if you’re up-to-date on your cybersecurity news from across the world. If you’re behind on the news, fret not. We’ve sprinkled in some hints to help you along. The winners will be the first 3 people to submit the quiz…

Although GraphQL is one of the most efficient alternatives to REST API, it is vulnerable to attacks. Here, we discuss common GraphQL flaws.

This part of a two part series on GraphQL explains what GraphQL is & how it is configured, and explores its superior data fetching techniques

This article outlines the various methods of generating and verifying CAPTCHAs, their application, and multiple ways to bypass CAPTCHAs.