Estimated reading time: 4 minutes
Zero-day vulnerabilities represent an imminent threat to cyber security, and in this case, two such vulnerabilities, CVE-2023-38831 and CVE-2023-40477, have been identified in the widely utilized WinRAR software. These vulnerabilities pose a grave concern due to their potential for...Information Technology, Network Security & Cybersecurity Updates

Estimated reading time: 7 minutes
Introduction: First observed in the middle of 2021, Mallox Ransomware has emerged as a formidable threat in the cybercrime landscape. With its ability to encrypt all volumes, including local and network-shared drives, it gradually spreads control over the system,...
Estimated reading time: 4 minutes
Data protection laws have become increasingly relevant in today’s digital age, where businesses collect, store, and process large amounts of personally identifiable information. With India gradually emerging as a data-driven economy, the recent Digital Personal Data Protection (DPDP) Act...
Estimated reading time: 3 minutes
In a monumental leap for India’s space exploration journey, the Indian Space Research Organisation (ISRO) has captured the world’s attention with its successful Chandrayaan 3 moon landing. The culmination of meticulous planning, dedication, and scientific prowess, this achievement marks...
Estimated reading time: 3 minutes
In today’s ever-evolving threat landscape, an organization’s security operations have never been more crucial. The complexity of remote work and multiple devices, apps, and tools has expanded the attack surface. Cybercriminals use advanced tactics, including AI-powered spear-phishing attacks on...