Hackers Allegedly Claim Star Health Insurance CISO Sold the Data
Hackers have alleged that the Chief Information Security Officer (CISO) of Star Health Insurance, Amarjeet Khanuja, sold them sensitive data...
Read more →Hackers have alleged that the Chief Information Security Officer (CISO) of Star Health Insurance, Amarjeet Khanuja, sold them sensitive data...
Read more →Recently, there has been a rise in hackers using callback phishing. One common form of this attack, known as telephone-oriented...
Read more →A Boot Sector Virus is a type of malware that targets the boot sector of a computer’s hard drive or...
Read more →The Russian Federal Service for Supervision of Communications, Information Technologies, and Mass Media has officially blocked the popular communication platform...
Read more →Stealing personal data information (‘name’, ‘Social Security number’, ‘credit card details’, etc.) for fraudulent activities is dubbed “identity theft.” While...
Read more →Air-gapped systems are security measures that isolate “computers” and “networks” from external connections (like the “internet”) to block ‘unauthorized access’...
Read more →A notable hacking forum, DumpForums, has claimed responsibility for a massive data breach targeting Dr.Web, a prominent Russian cybersecurity company....
Read more →Google has released a critical security update for its Chrome browser, addressing several vulnerabilities, including two high-severity type confusion flaws...
Read more →In its latest Patch Tuesday release, Microsoft addressed 118 vulnerabilities, including five zero-day flaws, two of which attackers are actively exploiting....
Read more →Partnership aims to help businesses eliminate vulnerable attack surfaces and provide a more streamlined user experience. Badge Inc., the award-winning...
Read more →A bastion host is a critical line of defense, acting as a fortified gateway between an internal network and external...
Read more →A critical set of vulnerabilities in the Common Unix Printing System (CUPS) has been disclosed, allowing remote attackers to execute...
Read more →