Email:

Phone No.

Whatsapp

Blog

MITRE Shares List of Most Dangerous Hardware Weaknesses
MITRE Shares List of Most Dangerous Hardware Weaknesses
MITRE Shares List of Most Dangerous Hardware Weaknesses
MITRE Shares List of Most Dangerous Hardware Weaknesses

MITRE Shares List of Most Dangerous Hardware Weaknesses

MITRE Shares List of Most Dangerous Hardware Weaknesses MITRE shared a list of the topmost dangerous programming, design, and architecture security flaws plaguing hardware this year. Such weaknesses can be found in hardware programming, design, or architecture, leading to exploitable vulnerabilities and exposing systems to attacks. This list is the result of the not-for-profit MITRE organization collaborating

FBI: Ransomware Targets Companies During Mergers and Acquisitions

FBI: Ransomware Targets Companies During Mergers and Acquisitions The Federal Bureau of Investigation (FBI) warns that ransomware gangs are targeting companies involved in “time-sensitive financial events” such as corporate mergers and acquisitions to make it easier to extort their victims. In a private industry notification published on Monday, the FBI said ransomware operators would use the

Android November Patch Fixes Actively Exploited Kernel Bug

Android November Patch Fixes Actively Exploited Kernel Bug Google has released the Android November 2021 security updates, which address 18 vulnerabilities in the framework and system components, and 18 more flaws in the kernel and vendor components. Among the fixes, there’s one that plugs CVE-2021-1048, a local escalation of privilege caused by a use after free weakness, which, according

What is cybersecurity? 5 best cybersecurity practices to follow

What is Cybersecurity? Cybersecurity is the practice of protecting networks, programs, and systems from any cyberattacks that aim to alter, destroy, or access confidential and sensitive information, interrupt normal business operations, or extort money from unsuspecting victims. With innovations that cybercriminals are promptly implementing to their attack tactics, implementing effective cybersecurity measures is becoming challenging

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us