The long-awaited data protection rule draught was released by the Indian government on Friday, marking the fourth attempt since it was first suggested in…
Cybersecurity in India
In Hyderabad, a victim of cyber fraud files an FIR every fifth crime filed in a day
One of the main hubs for cybercrime has now been identified as the city of Nizams, which is also a center for IT. According…
How A Security Concern Was Caused By An IP Address Compromise At The DRDO Missile Lab
The Defence Research and Development Organization (DRDO), which is in charge of the nation’s missile development projects, suffered a significant breach that the Indian…
Google, Microsoft, and Oracle has most vulnerabilities in early 2021
Google holds the top opening with more than 547 weaknesses, Microsoft is on number two with 432 undesirable openness occurrences and Oracle is on…
Playbook by Ransomware-as-a-Service provider Leaked Source Code
According to researchers, Conti, the group that provides ransomware as a service (RAAS), just exposed their playbook. In addition to the Cobalt Strike handbook…
APT SideCopy targeting Indian Government officials
Once corrupted, APT gang SideCopy utilizes some tools such as keyloggers, document enumerators, and others to rob data from the targets. They targeted web…
Domino’s India Hacked, Credit Card Data of 1 million users on sale
In the weekend news that shook many, a cybersecurity expert has claimed that the credit card details of 1 million Domino’s India customers are…
Cybercrime India Escalate to 52% in Organizations Past Year
A study found that while cybercrime India is expanding in recurrence and seriousness, the budgets for cybersecurity have remained generally unaltered as a level…
MobiKwik, Indian Payment provider to deny data breach of 8.2 TB
MobiKwik Indian payment services provider keeps on preventing reports from getting a piece of colossal data breach influencing a huge number of clients, in…
JSON parsers generating nuanced security threats; research claims
Recent security research claims that visibly harmless conduct of JSON parsers can implement an assortment of security vulnerabilities with respect to the performance of…