National carrier Air India has reported a massive cybersecurity attack, leading to the personal data leak of passengers. The incident has affected around 45 lakh data subjects across the world.…
Cobalt Strike Beacon A recent report has disclosed how Cobalt Strike is being exploited by attackers in several campaigns to deploy malware. Cobalt Strike is a legitimate commercial penetration testing…
Microsoft has open-sourced SIMULAND a tool that can be used to build lab environments where security teams can simulate attacks and verify the detection effectiveness of Microsoft security products. SimuLand…
A Time-Based Blind SQL Injection vulnerability with a CVSS Score of 7.5 severiity in WP Statistics, which is a WordPress plugin with over 600,000 active installs provides website statistics. An…
The median attacker dwell time before detection is 11 days or 256 hours, according to data from Sophos. That’s time in which invaders are free to conduct malicious activity, such…
The Conti ransomware gang has released a free decryptor for Ireland’s health service, the HSE, but warns that they will still sell or release the stolen data. Though block is…
In last post we have discussed on one of the Application testing technique RASP , its functionality , importance, methods . Today we will discuss about another hidden technique used…
Palo Alto Networks announced a slate of new features designed to help customers introduce a Zero Trust across their network security stack. The process of adopting complete Zero Trust Network…