You’re bored during the lockdown. To pass the time, you create an imaginary itinerary to Italy. After a…
You’re bored during the lockdown. To pass the time, you create an imaginary itinerary to Italy. After a…
A data breach is a security gap in which information or data is accessed or stolen without authorization….
Accept it or not we are now living in a “new normal” where the world has changed dramatically….
Gamers beware. A report by Chinese cybersecurity researchers recently discovered a malicious botnet campaign that infected hundreds of…
Most of the popular applications we use today are built upon open-source libraries – free code repositories that…
India’s BHIM (Bharat Interface for Money) app used for mobile payments was reported recently to have suffered a…
Poulight is an info-stealer trojan which most probably originated in Russia. It is written in the .NET and…
Maze is a recently highlighted ransomware among the ever-growing list of ransomware families. The ransomware is active from…
Malicious bots are becoming a major threat on the Internet. A recent survey suggested that attacks on applications,…
Maze is a recent highlighted ransomware among the ever-growing list of ransomware families. Maze ransomware is active from…