An Overview of Bug Bounty Hunting in India
Bug bounty hunting is all about highly-skilled hackers detecting security vulnerabilities and one of the most sought after professions in the world today. Read on to know more… Bug bounty…
Bug bounty hunting is all about highly-skilled hackers detecting security vulnerabilities and one of the most sought after professions in the world today. Read on to know more… Bug bounty…
The attackers have already targeted customers of more than 27 Indian banks, including large public and private sector banks, according to the CERT-In. According to the country’s central cyber security…
Telegram is being used by threat actors to buy, sell, and distribute hacked data and malware tools, making it a viable alternative to the darknet forum. Cybercriminals use a variety…
Ransomware gangs have been daring in targeting organizations. Since the pandemic, the healthcare industry has become a prominent target for these gangs. In July, a prolific ransomware gang known as…
HackerU, a global educational technology company specializing in cybersecurity and other digital skills programs, has announced the acquisition of Cybint, a global SaaS-based cyber education company. This acquisition not only…
Mobile security experts have always been looking for potentially threatening vulnerabilities in the 5G technology. Let’s have a look at the recent security aspects of 5G technology… From Singapore to…
Ransomware attacks are doing more than threatening to expose proprietary information; they’re shutting down operations. In June 2020, one of the world’s largest auto manufacturers was forced to shut down…
The importance of an integrated IT security strategy is steadily increasing, especially in current pandemic times. The accelerated digitalization in almost all areas of life has broadened the scope of…
Research by HackerOne, a hacker-powered security platform, has revealed hackers are finding over twice as many vulnerabilities in software in 2020 than they were in 2019. Hackers have helped find…
Penetration of an organization’s local network takes as little as 5 minutes, according to a new report from Positive Technologies, one of the largest cybersecurity research firms in Europe. Positive…
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More