There’s a new Escobar in town – The Android World

As soon as I saw this article yesterday, I was driven back to the binge-watching time of the famous TV series “Narcos”. History has witnessed his personality (Escobar) and synonymity with crime. Though ironically speaking if cybercrimes were to exist during his time which it didn’t might’ve existed if his men stole a truckload ofContinue reading “There’s a new Escobar in town – The Android World”

The war between Ukraine & Russia continues – CaddyWiper, Rostec attacks – Is there an end?

Last week, there were a few facts that were covered in the previous post that is being continued with few more cyber attacks that has happened since. A couple of things that has been highlighted since this past week is that the war is still raging on. The verdict is that the war could endContinue reading “The war between Ukraine & Russia continues – CaddyWiper, Rostec attacks – Is there an end?”

Russia’s invasion over Ukraine, Foxblade & wiper malware,  Conti’s leaked chats  – A hybrid cyber-crime warfare

It’s shocking to learn the current status of Ukraine’s condition and its nothing short of admiring the guts with the resilience and perseverance that the Ukrainians are standing with.  All local and global news channels have been covering this act of terrorism and this historical event has impacted Ukraine with Kyiv also being one ofContinue reading “Russia’s invasion over Ukraine, Foxblade & wiper malware,  Conti’s leaked chats  – A hybrid cyber-crime warfare”

Unusual number of vulnerabilities come to limelight – Enter UEFI

UEFI or Unified Extensible Firmware Interface is an interface that connects the device’s firmware and the operating system making it responsible for vital processes like the booting process, system diagnostics, and repair functions. Close to a couple of dozens of vulnerabilities have been reported with respect to UEFI and these flaws are in association withContinue reading “Unusual number of vulnerabilities come to limelight – Enter UEFI”

The bridge just got shorter – Human brain, body and computers – A review

It wasn’t long ago that when BCIs were potentially put use to neurorehabilitation and also giving rise to neuroprosthetics and other emerging technologies. Scientifically, the field of neurotechnology has enabled individuals with motor impairments and disabilities to a great extent thereby providing an improved quality of life. A recent study has designed a compact gadgetContinue reading “The bridge just got shorter – Human brain, body and computers – A review”

Cybersecurity market and technology predictions in 2022 – An insight

The beginning of another set of 352 days got off in a semitone with mixed emotions as the threat landscape and attack surfaces have exponentially increased not only for digital information but also for the existence of mankind. With new variants in the genomic constitution of the SARs-CoV 2, today there exists multiple threat vectorsContinue reading “Cybersecurity market and technology predictions in 2022 – An insight”

All it takes is one vulnerability leading to another one  – Log4j, an overview of the impact

My notification screen was populated with the news of the Log4j vulnerability since the last two days. Every influencer, company, research organizations have shed enough light for us to understand the impact of a vulnerability that can cripple down any organization immaterial of its size. It was towards the end of the previous week, thatContinue reading “All it takes is one vulnerability leading to another one  – Log4j, an overview of the impact”

Pink botnet to Black shadow data breaches – A different color setting

When I started writing this article, I was still thinking about an appropriate headline but I guess most of the cybersecurity news these days entail any type of new attack, current vulnerabilities being exploited and then a mix of some new defense techniques that are being developed today. This post entails a mix of pointsContinue reading “Pink botnet to Black shadow data breaches – A different color setting”

Ransomware gang taken down, digs its own grave – Turns aggressive

In this era of cyber-advancements, every type of cyber attack has shown its true potential but one type just remains strong, evolving and sophisticated with time. No wonder, Darwin’s theory of evolution definitely is applicable with these cyber-attacks as well. As per multiple surveys including auth0, cyber magazine, and purplesec, the most common type ofContinue reading “Ransomware gang taken down, digs its own grave – Turns aggressive”

The rise of cyber-attacks – Enter Nobelium – Warns Microsoft 

I remember when I first read about the Solarwinds article and wrote about it here, it took me by surprise a simple mistake with a password could’ve caused so much havocs. The Nobelium group has been on the radar for quite a while after the Solarwindws attack. The group also ended up breaching some of Microsoft’sContinue reading “The rise of cyber-attacks – Enter Nobelium – Warns Microsoft “