Top 7 technology innovations and trends in cybersecurity
With the increase in cyberattacks, several top cybersecurity innovations have been gifted by technology October has got both Halloween day and Cybersecurity Awareness month. It’s…
With the increase in cyberattacks, several top cybersecurity innovations have been gifted by technology October has got both Halloween day and Cybersecurity Awareness month. It’s…
Chinese state-sponsored threat actor targets media, diplomatic, governmental and public sector organizations and think-tanks in Japan Stone Panda which is the Chinese state-sponsored threat actor,…
In late-September, Quad foreign ministers released a joint statement on cyberattacks . Can Quad prevent increasing cyberattacks in the Indo-Pacific? In June, Quad unveiled an…
Microsoft has announced the expansion of its CyberShikshaa program. CyberShikshaa program launched by Microsoft and DSCI in 2018 claims to have trained 1,100 women and…
An unofficial patch has been made available for an actively exploited security flaw in Microsoft Windows The newly released patch makes it possible for files…
The threat actor behind the Fodcha distributed denial-of-service botnet has reemerged with new capabilities. This includes changes to its communication protocol and the ability to…
Juniper Junos OS suffered several security flaws, some of which could be exploited to achieve code execution. Chief among them is a remote pre-authenticated PHP…
Same Hackers are suspected behind the August and June security breaches. After the August hack resulted in unauthorized access of customer information, Communication services provider…
Bed Bath & Beyond said that there was a possible data breach in the company Bed Bath & Beyond Inc were of the view that…
Please confirm you want to block this member.
You will no longer be able to:
Please note: This action will also remove this member from your connections and send a report to the site admin. Please allow a few minutes for this process to complete.