cybersecurity

Critical Flaws in MEGA Cloud Storage Let Attacker Decrypt User Data

The experts at one of Europe’s leading universities, ETH Zurich, Switzerland reported a critical vulnerability in MEGA cloud storage that…

3 years ago

Secure Web Gateway (SWG) – A New Bulletproof Corporate Web Security To Protect Sophisticated Web Attacks

The goal of Perimeter 81 from day one has been about providing cost-effective and cloud-based security solutions, such as our…

3 years ago

Critical Vulnerability in Azure Synapse Let Attackers Control other Customers’ Workspaces

The Microsoft Azure Synapse service has been identified as unsafe to use, and Orca Security has issued a security advisory…

3 years ago

How Does WAF Help in Zero-day Attacks Prevention

Zero-day attacks have been a real pain to organizations these days. Due to the unavailability of patches for such attacks,…

3 years ago

Multiple NuGet Package Manager Flaws Let Attackers Target .NET Framework

51 individual software components have been identified by the security experts to be vulnerable, and as per the analysis, the…

4 years ago

How Cost Cutting on Cybersecurity Presents an Opportunity for Hackers

Amidst the impact of the COVID-19 pandemic, executives of most organizations are looking at ways to cut expenses across their…

4 years ago

5 Ways to Increase CyberSecurity with Information Technology

The world is progressing in the field of both cybersecurity and information technology. A computerized world comes with many pros…

5 years ago

Cyber Security Protection Checklist for Remote Workers

Amid all the COVID-19 chaos, as people get limited to their homes, the world is seeing a significant shift towards…

5 years ago

Hackers Extensively Attacking Microsoft 365 Customers Using Malicious .slk Files

Hackers use a new attack method that bypasses both Microsoft 365 default security (EOP) and advanced security (ATP). The attack…

5 years ago

Ripple20 – 19 zero-day vulnerabilities Affects Billions of IoT Devices

A series of 19 different security vulnerabilities discovered dubbed Ripple20 affecting hundreds of millions of IoT devices. By exploiting the…

5 years ago