A new addition to the 2021 cyber-attacks – This time, energy giant Shell

The first quarter of the year has not even ended, but the list of cyber-attacks have been exponentially increasing. Solarwinds and Microsoft were the earlier victims and now it is the energy giant Shell. Energy goliath Royal Dutch Shell has become a recent casualty of a series of attacks on users of the Accellion legacyContinue reading “A new addition to the 2021 cyber-attacks – This time, energy giant Shell”

EdTech and the learning curve of cybersecurity – A new insightful association

Education technology or EdTech as what it is prominently known today in the digital era has undoubtedly gained popularity amongst individuals. It has become more common and a significant medium to share and present knowledge and aids individuals by providing information at their disposal. Forbes has defined EdTech as the practice of introducing IT toolsContinue reading “EdTech and the learning curve of cybersecurity – A new insightful association”

Cyber Threat Intelligence, more than a requirement today – An overview of the threat landscape

An expanding horizon of cyber threats and risks like phishing, zero-day vulnerabilities, data breaches, and insider threats, is the key factor driving the development of the global cyber threat intelligence market. Moreover, expanding interests in R&D exercises for improved threat intelligence security solutions by a few associations and growing government sustenance for the advancement ofContinue reading “Cyber Threat Intelligence, more than a requirement today – An overview of the threat landscape”

A Zero Trust approach for IoT and OT – An embracing perspective

Zero trust or ZT as it is more prominently known today, has become more than just a theoretical concept. As more devices are coming together to form the IoT space or as I like to call, “the growing allied era”, the intensity of data or information which is exposed for the attack surface will growContinue reading “A Zero Trust approach for IoT and OT – An embracing perspective”

India hits back with a strategy to thwart cyber threats – A more focused cybersecurity plan

It wasn’t long that I had shared a post around the Chinese hack resulting in power outages in the financial capital of India. A couple of days back, Indians have gone back to the drawing board to think hard and design an effective strategy to defend cyber risks amid China’s cyber threats. The focus hasContinue reading “India hits back with a strategy to thwart cyber threats – A more focused cybersecurity plan”

Cybersecurity in the post COVID era – The need for the years!

Since the inception of the 2020 era, time can briefly be divided into three phases viz, the pre-covid times rather the happy times, the covid times (test of time) and finally the post covid time (recovery phase). With the vaccination around, things are kind of getting back to normal and the businesses are beginning toContinue reading “Cybersecurity in the post COVID era – The need for the years!”

India’s power grid targeted by Chinese hackers – Overview of the malware attack

People living in Mumbai, the financial capital of India did experience a power surge which affected almost the entirety of the city. In addition to the existing border tensions, a cybersecurity research company (US based firm) has reported that state sponsored Chinese hackers have attempted to take down the national power grid. The China linkedContinue reading “India’s power grid targeted by Chinese hackers – Overview of the malware attack”

Recent breach in government data – critical vulnerabilities still to be fixed

Just a couple of days back, security research team Sakura Samurai had found some critical vulnerabilities. The scrutiny was performed through RVDP also known as Responsible Vulnerability Disclosure Program. The list is believed to be legally provided to the security researcher. One of the members Robert Willis had reported that he was able to gainContinue reading “Recent breach in government data – critical vulnerabilities still to be fixed”

Identity and access management and Internet of Things – An explorative study

Today with the expanding perimeter of the threat landscape and ever increasing digitization of data, the need for cybersecurity is becoming more than important and a factor that can’t be ignored. A lot of these threats are primarily as a result of insider threats and there’s no second thoughts that Identity and access management (IAM)Continue reading “Identity and access management and Internet of Things – An explorative study”

New vulnerabilities being exploited in Solarwinds software – A review

It wasn’t that long, the Solarwinds cyberattack was all over the news, and now there are new vulnerabilities that are being exploited. Researchers from Trustwave have identified three new critical flaws. The vulnerabilities has been addressed to potentially provide access to an attacker leading to compromise the network infrastructure, causing distress to its consumers. SolarwindsContinue reading “New vulnerabilities being exploited in Solarwinds software – A review”