Our Blog

Read our latest blog posts

Threat actors’ next big target: VIPs, Executives, and Board members

Senior executives are 12 times more likely to be targets of social incidents, and 9 times more...

Continue reading

Combating data breaches caused by misconfigured apps

There has been a precipitous rise in the number of COVID-themed data breaches. Here are security practices...

Continue reading

Top open source resources to stay vigilant against COVID-themed cyber attacks

Here is a consolidated list of popular open source threat intel resources that can help you combat...

Continue reading

Pen-testing IoT Devices for Vulnerabilities

Although the security of IoT devices demands immediate attention, the abundance of these devices has resulted in...

Continue reading

How are Python modules used for web crawling?

The significance of web crawling and how to fetch downloadable URLs from YouTube using Python modules, to...

Continue reading

Weaponizing AI to orchestrate cyber attacks

When it comes to cybersecurity, AI is changing how we detect and respond to threats. However, with...

Continue reading

How do you achieve concurrency with Python threads?

Implementing concurrency, without decelerating a program, is an ongoing concern. So, how do you achieve this using...

Continue reading

Why attackers can’t resist Android applications

Why do attackers often target Android apps? What makes them easy targets? How do attackers exploit their...

Continue reading

RBI guidelines for banks to combat escalating cyber attacks

The Reserve Bank of India (RBI) has issued comprehensive guidelines too ensure that Indian banks function in...

Continue reading

How do threat actors discover and exploit vulnerabilities in the wild?

Attackers use a variety of tools and techniques to discover and exploit security vulnerabilities in widely used...

Continue reading