Estimated reading time: 3 minutes
On Friday, March 29, developer Andres Freund detected unusual behavior in his Debian sid environment. In response, he contacted an open-source security mailing list to report his discovery of an upstream backdoor in the commonly used command-line tool XZ...Information Technology, Network Security & Cybersecurity Updates
Estimated reading time: 4 minutes
Introduction: Originating in March 2023, Abyss Locker, a recently established ransomware operation, has swiftly targeted companies, transforming into a significant threat across various sectors, such as industrial control systems (ICS), enterprises, and public-sector organizations. It poses a significant threat...Estimated reading time: 3 minutes
In today’s interconnected world, the manufacturing industry is increasingly vulnerable to cyber-attacks. Recent incidents, such as the cyber attack on Suzuki motorcycles and the impact on billion-dollar companies like NVIDIA and Colonial Pipeline, highlight the devastating consequences of these...Estimated reading time: 4 minutes
In today’s interconnected digital world, traditional security models that rely on a secure network perimeter are no longer sufficient to protect against sophisticated cyber threats. That’s where zero trust security comes into play. Zero trust is a security strategy...Estimated reading time: 3 minutes
The first India Cyber Threat Report 2023 revealed the automotive supply chain as the most cyberattacked sector. Over the past three to four years, the global adoption of Industry 4.0 has marked a transformative trend, witnessing extensive digitalization integration...Estimated reading time: 2 minutes
The year 2023 was eventful, witnessing a myriad of advanced threats targeting prominent economies, including India. Many still remember the fake IRCTC app that stole sensitive user information or the infamous loan apps that devastated many innocent lives. Malware...Estimated reading time: 3 minutes
India’s swift enactment of the Digital Personal Data Protection (DPDP) Act has triggered considerable apprehension among businesses, mainly due to the impending deadline for compliance. Several myths regarding the Act have further intensified the confusion. To educate the business...Estimated reading time: 4 minutes
Ransomware attacks today have become increasingly prevalent and sophisticated. One such alarming trend is the surge in remote ransomware attacks, also known as malicious remote encryption. This attack vector involves using compromised endpoints to encrypt data on other devices...