Case Studies

Antivirus and firewalls are the backbone of any security program, used to gain visibility across the network for inward attacks.

The recent unearthing of a pretend center that targeted Flipkart and Myntra customers has yet again dropped at fore the

If you thought only large critical infrastructure and big corporations would always bear the strength of the increase in cyber-attacks,

Mobile apps that exhibit malicious or undesirable behavior square measure out there looking for victims. In December 2018, Google deleted

The Bill is probably going to impact national and International Corporation’s operative in India as a result of its data

Ransomware attacks are set to morph into two-stage extortion campaigns and criminals will exploit their extortion victims even more in

Overview CERT/CC researchers examined the satcom terminal Cobham EXPLORER 710 as an expansion of work from IOActive’s findings in 2014. They discovered

Overview iTerm2, up to and including version 3.3.5, with tmux integration is vulnerable to remote command execution. Description iTerm2 is

Overview Pulse Secure SSL VPN contains multiple vulnerabilities that can allow remote unauthenticated remote attacker to compromise the VPN server

Overview Multiple D-Link routers are vulnerable to unauthenticated remote command execution. Description Several D-Link routers contain CGI capability that is exposed to