Regular contributors write opinion pieces that reflect their take on topics related to data privacy, security, safety practices, etc.
We explain the evolution of the data leak extortion ecosystem through the advancements made by ransomware groups over the last three decades.
What makes digital fingerprints valuable to cybercriminals and what are the preventive measures you can adhere to so as to avoid its theft.
Experienced security professionals say that entry-level positions in security and hacking doesn’t require programming skills. Is this true?
This article explains how effective threat intelligence can assist you in taking proactive measures to counter cyber attacks.
The anonymity associated with Telegram increases the odds of misusing its features. Monitor activities on it regularly to fend off threats.
More than 1 in 5 organizations have experienced a security incident due to shadow IT. What are the risks associated and how do we avoid them?
It is essential to have quantifiable metrics to gauge the quality of web apps. Here is a list of 6 quality metrics to optimize web apps.
Senior executives are 12 times more likely to be targets of social incidents, and 9 times more likely to be targets of social breaches.
There has been a precipitous rise in the number of COVID-themed data breaches. Here are security practices that can defend your organization.
Here is a consolidated list of popular open source threat intel resources that can help you combat COVID-themed cyber attacks.
Being linked to the services we use every day, makes our phone numbers are attractive targets for hackers, who are increasingly resorting to SIM hijacking.
Investigation of a flaw in the logical design, of a previous version of Wibmo payment gateway, allowed parallel transactions with the same OTP.
The Reserve Bank of India (RBI) has issued comprehensive guidelines too ensure that Indian banks function in a cyber-resilient environment.
59% of companies have experienced data breach due to third-party vendors. Given the level of access most vendors have to an organization’s network, traditional risk management frameworks fall short.