The adoption of IoT devices by users across the world has been directly proportional to the interest of cybercriminals in it. The attacks on IoT devices are growing by the day and attackers are trying to find new ways to exploit the smart device... Read more
A system of communication is underpinned by the principle of end-to-end encryption by only letting the communicating users read the messages. This is put in place to prevent any potential eavesdroppers from accessing the cryptic keys needed to d... Read more
The structure in which security groups are usually constructed to respond and protect against cyber threats is highly flawed. The constant disconnect between where and how security policies are framed, security is enforced, and security is audit... Read more
Threat actors have been updating their tools of malice in order to get past security for monetary gains. One such instance has been observed with REvil Ransomware which has been updated with a new feature that allows its operators to automate fi... Read more
An advanced persistent threat group based in China has been observed exploiting the vulnerabilities in the MS Exchange Servers. Since the start of the month, a huge increase has been spotted in the communications to the PlugX C2 infrastructure a... Read more