Estimated reading time: 2 minutes
A critical remote code execution vulnerability has been discovered in famous web application framework Apache Struts, which allows attackers to execute arbitrary code. To address this issue, Apache Struts has issued a security advisory and CVE-2017-9805 has been assigned...
Estimated reading time: 3 minutes
There has been a surge in cyber attacks in the healthcare industry. Ransomware attacks have increased across all sectors, but healthcare industry is particularly vulnerable to such attacks. Getting locked out of systems while handling critical patient data or operational...
Estimated reading time: 3 minutes
Computer systems evolve at a breakneck pace. Every now and then, there are newer versions of software including web browsers, operating systems, and databases. These upgrades not only have better features but also have better security features built into them. However, many times...
Estimated reading time: 3 minutes
Modern businesses depend heavily on the continuous availability of data be it of the customer, product, employee or financial. Data, in any form (files, emails, collaboration tool or database) must always be available when required. Just like any other asset, loss...