Estimated reading time: 3 minutes
In 2015, the Government of India established a first of sorts – they created a chief cybersecurity officer position under the Prime Minister’s Office. Dr Gulshan Rai became the special secretary for cybersecurity and after serving four years in...Information Technology, Network Security & Cybersecurity Updates
Estimated reading time: 3 minutes
A supply chain is an omnipresent and inseparable element in every business, irrespective of its size. Hence, when it comes to cybersecurity specific to this aspect, simply protecting an enterprise’s periphery isn’t enough. Supply chains consist of people, logistics,...Estimated reading time: 3 minutes
The evolution of cybersecurity is both, fascinating and intriguing. Today’s cybersecurity professionals have immense responsibility and burden compared to yesteryears – they have to tackle with a wide range of cyberthreats such as malware, insider attacks & Distributed Denial...Estimated reading time: 2 minutes
CVE-2019-0708, popularly known as BlueKeep, is a RDP pre-authentication vulnerability which allows attacker to compromise a vulnerable system without user’s interaction. This exploit is also wormable, meaning that it can spread to other vulnerable systems in a similar way...Estimated reading time: 3 minutes
A major part of human communications today is dependent on satellites. More so, global navigation systems, military strategies, information collection, environment research, and even the internet are all dependent on the smooth functioning and continuous integration with these valuable...Estimated reading time: 3 minutes
In 2015, security researchers Charlie Miller and Chris Valasek remotely took control of a Jeep Cherokee vehicle as an experiment. By exploiting vulnerabilities in the vehicle’s Internet-connected entertainment and navigation systems, the two researchers activated the windshield wipers, turned...