Estimated reading time: 2 minutes
The prospect of geopolitical tensions leading to large-scale cyberattacks is a very real one. Nor would it be a new development – nation-states have been using cyberattacks as a warfare technique for more than a decade now. Perhaps the...Information Technology, Network Security & Cybersecurity Updates
Estimated reading time: 2 minutes
In the current modern era of information warfare, securing military assets has become strategically very important. Recently, Seqrite reported on Operation ‘Honey Trap’, an operation launched by a Pakistan-linked threat actor allegedly, which targeted employees from Indian defence organizations....Estimated reading time: 2 minutes
Enterprises are increasingly migrating operations to the public cloud, enthused by the many benefits it offers. By embracing cloud competencies, enterprises can become leaner and faster, enabling their employees to access information and services from wherever they are. It...Estimated reading time: 3 minutes
An insight into Transparent Tribe’s sub-division which has been incorrectly attributed for years. Introduction Quick Heal’s threat intelligence team recently uncovered evidence of an advanced persistent threat (APT) against Indian defence forces. Our analysis shows that many old campaigns...