Our Blog

Read our latest blog posts

Weaponizing AI to orchestrate cyber attacks

When it comes to cybersecurity, AI is changing how we detect and respond to threats. However, with...

Continue reading

How do you achieve concurrency with Python threads?

Implementing concurrency, without decelerating a program, is an ongoing concern. So, how do you achieve this using...

Continue reading

Why attackers can’t resist Android applications

Why do attackers often target Android apps? What makes them easy targets? How do attackers exploit their...

Continue reading

RBI guidelines for banks to combat escalating cyber attacks

The Reserve Bank of India (RBI) has issued comprehensive guidelines too ensure that Indian banks function in...

Continue reading

How do threat actors discover and exploit vulnerabilities in the wild?

Attackers use a variety of tools and techniques to discover and exploit security vulnerabilities in widely used...

Continue reading

Employing Typography to Improve Content Engagement

Typography plays a significant role in the process of writing textual content. The aesthetic of the text...

Continue reading

Popular payment gateway provider flaw: Transactions with same OTP

Investigation of a flaw in the logical design, of a previous version of Wibmo payment gateway, allowed...

Continue reading

Menace of Fake Banking Services

Scammers have repackaged their scams, that are delivered to us, via other channels. The new schemes are...

Continue reading

FASTag Phishing Campaigns Flourish on Social Media

With FASTag, toll collection is the latest of our everyday services that has gone digital. And cyber...

Continue reading

SIM Hijacking: An imminent threat to anybody with a phone

Being linked to the services we use every day, makes our phone numbers are attractive targets for...

Continue reading