The structure in which security groups are usually constructed to respond and protect against cyber threats is highly flawed. The constant disconnect between where and how security policies are framed, security is enforced, and security is audit... Read more
Threat actors have been updating their tools of malice in order to get past security for monetary gains. One such instance has been observed with REvil Ransomware which has been updated with a new feature that allows its operators to automate fi... Read more
An advanced persistent threat group based in China has been observed exploiting the vulnerabilities in the MS Exchange Servers. Since the start of the month, a huge increase has been spotted in the communications to the PlugX C2 infrastructure a... Read more
Since the start of the year 2020, the world had experienced waves of COVID19 surges due to which we saw the failure of measures that we deemed to be preventive. Similarly, the end of the year 2020, saw the compromise of as many as 18000 systems... Read more
In the digital age, data has always been of prime importance and its protection has always been imperative. Understanding this fact, cybercriminals have altered their pursuit of data. Consequently, we have seen a steep rise in ransomware since t... Read more