Supply Chain Attacks!

Supply Chain attacks are emerging as a new type of attack that identifies the weak areas and break-in. Supply chain attacks give cybercriminals yet another opportunity to attack and breach the organization’s defense. Since security teams don’t know about the changes that the attacker did, the products/services are deployed as they are coming from trusted […]

Log4j Vulnerability: A Potentially Disastrous flaw

CVE CVE-2021-44228 NVD Published Date 12/10/2021 NVD Last Modified 12/15/2021 Base Score 10.0 Critical Log4j? Still, wondering what is it? Two years into the pandemic and the challenges around remote working are still taking their toll. As yet another security nightmare is in full swing. Attackers this time made it an easy way to exploit […]

What are insider threats? How can you prevent them?

Insider threats are users with genuine admittance to organization resources who utilize that entrance, regardless of whether noxiously or unexpectedly, to make some harm the business. Insider threats aren’t necessarily limited to just current employees, they can also be former employees, contractors or partners who have access to an organization’s systems or data.With insider threats […]

Hotlinking – Challenges and Preventions

HOTLINKING is one such technique where keyword stuffing, comment spam, and paid links are just a few internet sins committed by marketers. “As it’s a well-known fact many people aren’t at their best behavior on the internet.” This includes marketers. Known as black hat SEO, these techniques seek to game search engine algorithms in order […]

Cybersecurity Bi-weekly Roundup: Week of 31st October

A bi-weekly roundup of the latest cybersecurity news and research Halfway down the week and we’ve got you covered till the weekend about all the nitty-gritty in the world of cybersecurity! 1. Millions of Android Users Scammed in SMS Fraud Driven by Tik-Tok Ads TikTok ads scam is adding those extra bucks to your phone […]

Cybersecurity Bi-weekly Roundup: Week of 19th September

A bi-weekly roundup of the latest cybersecurity news and research Halfway down the week and we’ve got you covered till the weekend about all the nitty-gritty in the world of cybersecurity! 1. Microsoft’s ‘passwordless future’ runs the risk of shutting down older people. Nobody likes passwords. They’re inconvenient. They’re a prime target for attacks. Still, […]

Cybersecurity Bi-weekly Roundup: Week of 23rd August 2021

A bi-weekly roundup of the latest cybersecurity news and research. Halfway down the week and once again we’ve got you covered till the weekend on the what’s and nots in the world of cybersecurity. 1. Phishing attack exposes medical information for 12,000 patients at Revere Health According to an official statement released by medical organisation […]

Olympics – Let the security round begin!

With the Olympics rolling into its third week, victory seems to be lining up for beloved Olympians from fencing to hockey, looks like success has been paving its way and is making sure to not leave any stone unturned. Having said that, as much as we all love to see and vouch for our favorites. […]

Middle East Cyber Security concerns : 3 strategic approaches

The temporary measure became the “New Normal” in Middle East 2021 is no different than 2020, many are still staying at home and working and there has been a continuous reliance on technologies that were auxiliary before 2020. While many thought it would be a transitory course of action, this now has shifted to be […]

Do you know how they hacked your account? Part three: Vulnerabilities

In the first two parts, we focused on the user interaction that may cause infection, but sometimes it is not the user by himself is the problem, it is also the vulnerable system he is using Vulnerability A cyber security vulnerability is a weakness which allows an attacker to undermine your system’s data security defenses. […]

Scroll to top