GT exclusive: US company revises evidence after truth about ‘Volt Typhoon’
Peek into Monthly Vulnerabilities: June 2024

Blog Vulnerabilities June 2024 Peek into Monthly Vulnerabilities: June 2024 As more and more vulnerabilities and security flaws have surfaced throughout the rapidly changing cyber landscape, the need to keep an eye on our cybersecurity has become more keenly felt than ever before. The patching requirements of good cyber hygiene mandate that your chain is […]
Navigating the Threat Landscape: Stealer Logs and Their Impact on Security

Blog The new era of the digital domain has brought the world closer together in unprecedented ways, offering a level of ease and expedience that has never before been possible. However, it has also created its own unique set of security-related problems, including one of the most serious and evolving kinds of stealer logs. What […]
Polyfill.io Supply Chain Attack: How Over 100,000 Websites Were Compromised and What You Need to Know

Blog Polyfill.io supply chain attack Polyfill.io Supply Chain Attack: How Over 100,000 Websites Were Compromised and What You Need to Know The Polyfill.io Scandal: What Happened? A highly used open-source JavaScript library, Polyfill.io helps to enable older browsers to implement modern web functionalities. This highly trusted service has recently been compromised, leading to massive supply […]
Threat Actor Claims 0-Day Sandbox Escape RCE in Chrome Browser
Top 10 Tools for Effective Attack Surface Management

Blog Top 10 Tools for Effective Attack Surface Management Organizations are acting under duress. So much has changed in the digital sphere so quickly. The ever-increasing sophistication and interconnected complexity have provided attackers with a wider pool of targets to exploit, significantly raising the number of potential damage vectors compared to years gone by. Attack […]
New Satanstealer Malware Steals Browser Cookies and Passwords

Hunter’s Lens: Ransomware 2.0: Beyond Encryption to Extortion

Blog Hunter’s Lens: Ransomware 2.0: Beyond Encryption to Extortion In the past few years, one cybersecurity evolution has stood out to me as a particularly concerning development. That is the growing ferocity and effectiveness of ransomware, which I’ve referred to as ‘Ransomware 2.0’. Ransomware is malicious software that forces individuals to pay to regain access […]
Charon Android Botnet Made a Comeback With New Weapons
Peek into Monthly Vulnerabilities: May 2024

Blog Peek into Monthly Vulnerabilities May 2024 In May 2024, one of the largest number of vulnerabilities and security wrongdoings in this ever-changing cyber world were discovered. These vulnerabilities indicate that we must remain vigilant about our approach to cybersecurity. The online security landscape requires regular security patches to be in top form. Maintaining good […]