We live in a data-driven world filled with multiple software and products that demand confidentiality, integrity, and availability at every cost. Those products also encompass critical functionalities and require a...
In this era of digital technology, where technology is evolving and growing exponentially, and everything is being digitized, cyber threats and threat actors are also evolving at an alarming pace....
On December 10, 2021, cyberspace got flooded with a critical vulnerability in the popular java-based logging package log4j. The vulnerability is now called Log4Shell and published as CVE-2021-44228 with a...
Prior to cloud computing, we were used to downloading and installing applications for our use. Organizations were habitual in creating their data center, hiring IT professionals, buying servers and related...
The cybersecurity industry has seen massive growth in social engineering, especially phishing attacks, over the last few years. The recently published DBIR report in May 2021 has shared an 11%...