Estimated reading time: 5 minutes
A few months back, Delphibased malware was being distributed on multiple systems via SMB exploit. The payloads used by this malware have close similarities with open-source Gh0stRAT code. Gh0st has been used by Chinese threat actors to target multiple...Information Technology, Network Security & Cybersecurity Updates
Estimated reading time: 2 minutes
As new-age threats dominate the business landscape, an increasing number of organizations have come to identify cyber insurance as a key component of their risk management plan. Organizations understand that cybersecurity threats can cause a great deal of financial...