In the russia-ukraine war telegram was used against a hacktivist group.

0
As the Russia-Ukraine war enters its eighth day, cyber criminals and hacktivist groups are increasingly embracing the Telegram chat service for their activities. "User volume rose a hundredfold daily on Telegram linked...

These are some Additions of flaws in the exploited vulnerability catalog

0
The United States' Cybersecurity and Infrastructure Security Agency (CISA) published 95 new security weaknesses to its Known Exploited Vulnerabilities Catalog this week, bringing the total number of actively exploited vulnerabilities to...

What?! The peak of attackers has increased to 2.5 million requests per second

0
Imperva, a cybersecurity firm, announced on Friday that it had just mitigated a ransom distributed denial-of-service (DDoS) attack that peaked at 2.5 million requests per second and targeted an undisclosed website...

This is why Attackers could get their hands on your linux kernel

0
Details concerning a now-patched high-severity vulnerability in the Linux kernel that could be exploited to escape a container and execute arbitrary instructions on the container host have surfaced. The flaw is due...

5 elections in 5 major states, result of an important decision in India

0
During the course of the current Gehlot government, Congress kept its MLAs, including those from Rajasthan and Maharashtra, in five-star hotels and resorts on multiple occasions. On March 10, the results of...

Increase in the US employment scenario but these other factors are not as fortunate

0
In February, U.S. hiring increased although wage growth slowed, indicating a healthy job market that will likely keep the Federal Reserve on track to hike rates this month while providing some...

Kanugolu’s relation with the Gandhi’s proved to be beneficial

0
Sunil Kanugolu, who worked closely with Prashant Kishor as part of Citizens for Accountable Governance, has been given the duty of preparing the Congress's electoral campaign in the future. Although Prashant Kishor's...

What was the greatest threat faced by the IT department during the great...

0
In the middle of 'The Great Resignation,' the damage caused by workers (or contractors) departing a business could be one of the most significant threats facing IT departments today. User onboarding...

Are these Significant security flaws already addressed by Cisco ?

0
Cisco released updates this week to address a new set of significant security flaws in the Expressway Series and Cisco TelePresence Video Communication Server (VCS) that might allow a hacker to...

The first side channel attacks discovered by university students.

0
A group of academics from North Carolina State University and Dokuz Eylul University have demonstrated the "first side-channel attack" on homomorphic encryption, which may be used to leak data while the...