Email:

Phone No.

Whatsapp

Blog

May Android Security Updates Patch 4 Zero-days Exploited in the Wild
May Android Security Updates Patch 4 Zero-days Exploited in the Wild
May Android Security Updates Patch 4 Zero-days Exploited in the Wild
May Android Security Updates Patch 4 Zero-days Exploited in the Wild

May Android Security Updates Patch 4 Zero-days Exploited in the Wild

May Android Security Updates Patch 4 Zero-days Exploited in the Wild According to info provided by Google’s Project Zero team, four Android security vulnerabilities were exploited in the wild as zero-day bugs before being patched earlier this month. Attacks attempting to exploit these flaws were targeted and impacted a limited number of users based on information shared

US Introduces Bills to Secure Critical Infrastructure From Cyber Attacks

US Introduces Bills to Secure Critical Infrastructure From Cyber Attacks The U.S. House Committee on Homeland Security has passed five bipartisan bills on Monday to bolster defense capabilities against cyber attacks targeting U.S. organizations and critical infrastructure. These bills were introduced as a direct result of the Homeland Security Committee’s oversight of recent cyber attacks, including

Microsoft Shares Workaround For OneDrive 0x8004de40 Login Issues

Microsoft Shares Workaround For OneDrive 0x8004de40 Login Issues Microsoft has shared a workaround for customers experiencing 0x8004de40 errors when trying to signing into their OneDrive accounts. These login problems have plagued OneDrive users for a while now, with reports streaming on social platforms and Microsoft’s own user community for years. While the error indicates that Microsoft OneDrive has issues connecting

Hackers Scan for Vulnerable Devices Minutes After Bug Disclosure

Hackers Scan for Vulnerable Devices Minutes After Bug Disclosure Every hour, a threat actor starts a new scan on the public web for vulnerable systems, moving at a quicker pace than global enterprises when trying to identify serious vulnerabilities on their networks. The adversaries’ efforts increase significantly when critical vulnerabilities emerge, with new internet-wide scans

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us