Latest News
Low-level implants, cryptocurrency hunt and geopolitical attacks: What APT actors were up to in Q1 2022
According to Kaspersky’s latest APT trends report for Q1 2022, Advanced Persistent Threat ...
Latest News
Escalation of cyberattacks targeting critical infrastructure as geopolitical tensions rise
Trellix, a cybersecurity company delivering the future of extended detection and response (XDR), ...
Latest News
ESET Research discovers vulnerabilities in Lenovo consumer laptops exposing users to risk of UEFI malware installation
ESET researchers have discovered and analyzed three vulnerabilities affecting various Lenovo consumer laptop ...
Latest News
Fortinet launches security awareness and training service
Fortinet announced the availability of its Security Awareness and Training service for companies ...
Latest News
Tech Mahindra collaborates with Microsoft to offer next gen integrated security solutions
Tech Mahindra, a provider of digital transformation, consulting, and business re-engineering services and ...
Cybersecurity
Indian data centers network faced enormous cyber attacks in April to December: IETE, CyberPeace Foundation, Autobot Infosec Report
The vulnerable exposed systems that are unmonitored and facing the internet, are the ...
Cybersecurity
Ransomware payments hit new records in 2021 as Dark Web leaks climbed: Palo Alto Networks Report
Ransomware payments hit new records in 2021 as cybercriminals increasingly turned to Dark ...
Latest News
Barracuda’s research uncovers new insights into the ways cybercriminals are targeting businesses with spear-phishing attacks
Barracuda released key findings of the ways spear-phishing attacks are evolving. The report, ...
Security
End-User Spending on Security and Risk Management to Grow 9.4% in 2022: Gartner
End-user spending on security and risk management in India is forecast to total ...
Cloud
Over 2,000 Databases Stored in the Cloud Found Unprotected and Exposed to Anyone with a Browser: Check Point Research
Check Point Research (CPR) finds sensitive data of mobile applications unprotected and available ...