Potent & Wider Attacks
Going by the recent media reports, it would seem that the malicious hacker groups behind data breaches are in a competition of sorts. The latest Equifax data breach, which exposed… Read more »
Going by the recent media reports, it would seem that the malicious hacker groups behind data breaches are in a competition of sorts. The latest Equifax data breach, which exposed… Read more »
Threat Hunting is the next stage of evolution for organizations seeking to advance their cyber defence strategy. It is an indicator that an organization considers its security practices, mature enough,… Read more »
Recently security researchers at Cisco Talos discovered that malicious hackers had injected a malware into Piriform CCleaner and CCleaner Cloud. CCleaner is a PC optimization tool. It removes potentially unwanted… Read more »
What is this Blue Whale Game? The Blue Whale Game is an internet game. It consist of series of tasks assigned to players / participants by administrators during a 50-day… Read more »
Layers & extent of product security function and integrating security in rapid deployment cycle Ever since the field of software development has existed, the security of the product being developed… Read more »
…Framework, efforts, policy interventions, investment & awareness for earning trust of citizens Cashless India initiative was launched with a view to transform India into a cashless economy. As a part… Read more »