Estimated reading time: 3 minutes
Cybercriminals are adopting unique ways for spreading malware and this has been evident in the cases of the Cerber ransomware where the RIG exploit was used and the WannaCry ransomware which used the SMBv1 vulnerability. And now it’s the...Estimated reading time: 3 minutes
Hackers are continuously innovating new ways of cyber-attacks. The malware are getting commercialized and attackers can launch spam and DDOS attacks at will. Many attackers modify their already discovered ‘malicious products’ (the malware) to keep ahead of anti-malware industry and security professionals. As...Estimated reading time: 3 minutes
Over the last few years, the Governments of many countries around the world have become sensitive towards inadequate protection of consumer data by the companies. Many of them have enacted various laws and regulations to protect this sensitive data. The late 1990s...