From ensuring seamless operations while working from home to defending geopolitically used cyber exchanges, a lot has been written and shared in the last few months about cybersecurity during the COVID-19 era. Needless to deduct, these thoughts... Read more
To stay one step ahead of the security companies who have been the eternal nemesis of the threat actors from cyberspace, they chose to evolve their tactics. With a new variation to each tactic they use, they become less predictable. An exhibitio... Read more
Various cryptocurrencies have been launched in recent years with the aim to enhance privacy and anonymity, although their success has been varied. One such cryptocurrency is Monero, which has achieved a high level of popularity and acceptance fo... Read more
Rapid change has been a perpetual constant, even when it comes to the threat landscape. The High stakes ransomware game is not like it used to be. These are no longer indiscriminate ransomware attacks. This new generation of threat actors are mo... Read more
With the evolution of technology, users find themselves with a lot of computing power at their fingertips in the form of a smartphone. Due to this, we have seen a clear shift in the lives of people as they have transformed digitally in every way... Read more