Blog
Threat or Opportunity? Big Data Analytics and Cyber Security
Many organizations, irrespective of their size and the industry they belong to, are exposed to cybersecurity threats. With the ongoing digitization in the...
Cyber Security Advisory 15-12-2021
This is to notify you of the Log4j2 Vulnerability (CVE-2021-42288) that is being exploited in wild. Below is a brief summary of this Vulnerability....
Cyber Security Advisory 14-12-2021
Researchers found a set of 13 new vulnerabilities affecting the Nucleus TCP/IP stack, which we are collectively calling NUCLEUS:13. The new...
Hackers are encouraged to apply: All typical Wi-Fi routers have weaknesses, according to a major security test.
2 December 2021, Bad Homburg – Nine well-known Wi-Fi routers were recently put through a rigorous security test in a lab setting, with shocking results in...
Ethical Hacking- Enter into the World of Mystery Codes and Security Risks
When we hear the word hacking, we picture a person busy operating in a dark room, working on big machines surrounded by bully racks and blinking lights....
There have been 14 new web browser exploits discovered.
Personal data can be accessed on the internet via so-called XS-Leaks. A large number of browsers are affected. Cross-site leaks, or XS-Leaks, are 14 new...
Pegasus Spyware is said to have hacked the iPhones of US State Department officials and diplomats.
According to various reports from Reuters and The Washington Post, Apple warned many U.S. Embassy and State Department employees that their iPhones may...
What Will the Cyber-Security Threat Landscape Look Like in 2022?
Did you know worldwide cyber-security spending will be close to $133.7 billion by 2022? This prediction by Gartner Inc. is a response to growing...
An ongoing hack has been launched against IKEA’s email systems.
IKEA is fighting a hack in which threat actors are utilising stolen reply-chain emails to target employees in internal phishing assaults. Threat actors...