Estimated reading time: 3 minutes
Data breaches and cyber-attacks are common occurrences which usually proliferate at an exponential rate. While it is important that enterprises tighten their enclosures, it is also advisable to understand how cybercriminals prepare for a breach. Hacker surveillance is one way...Estimated reading time: 3 minutes
The airline business is unique. While public perception about aviation is that of a luxury business; the business world sees it as a financial behemoth reeling under debt burdens. Only people from the aviation industry and a few from the security industry understand that...Estimated reading time: 4 minutes
A breach at IRINN systems could have affected India’s over 6000 ISPs, Government and Private Organisations. We at Seqrite’s Cyber Intelligence Labs (https://seqrite.com) working closely with our Partner, seQtree InfoServices (https://seqtree.com/) recently tracked a broadcast advertisement on a Darknet...Estimated reading time: 3 minutes
Today the economy is all about data. All the business financial information, customer information, Intellectual property information, and all other information about the business is stored in digital format. All this information is data. In a pre-digital era, the data was in physical...