APT37, popularly known as Reaper has been primarily targeting the chemicals, electronics, manufacturing, aerospace, automotive, and healthcare industries for North Korean state interests.
SQL injection attacks are well-understood and easily preventable, and the priority for risk mitigation should be preventing SQL injection attacks in the first place. Listen to Little Bobby Tables and sanitize your database inputs.
Indian ethical hacker Anand Prakash pointed out the bug to Facebook and Tinder, through which a hacker could take over tinder accounts with just a phone number.
Hiring specialized people as a security thinker is crucial for modern businesses, says Rajesh Maurya, regional vice president at Fortinet.
Synchronized security is the right ammo for businesses of all sizes, especially in this highly digitized world says Sunil Sharma, MD, Sophos India.
The ever-evolving threat landscape has made it imperative for security professionals to stay on top of the latest security tools. Here’s a look at the most sought after cybersecurity skills in 2018
CISOs will face new challenges as enterprises transition to cloud and adopt IoT. Here’s what they can expect to manage in the new year.
The era of cloud and IoT has heightened the role of the Chief Information Security Officer (CISO) in enterprises. Increasing sophisticated threats complicated by the lack of a skilled security workforce add to the challenges
With most organizations adopting mobile and implementing BYOD policies, how will the entry of the device and free WiFi loving millennial employee affect security of critical data?