Skip to content

Cyber Security Breach

Shocking Results From Hidden Internet – Exposed Database,Leaked Passwords, Code Leaks & more

In recent past there have been some major breaches and some key reasons responsible for the breach were Shadow IT, Leaked Credentials, 3rd Party/Vendor Risks. Major breaches like American Express, Uber, Dropbox, Dunkin Donuts, British Airways & many more. This research was in line with this to continuosly monitor the web (surface,deep,dark) to understand the leaked credentials,… Read More »Shocking Results From Hidden Internet – Exposed Database,Leaked Passwords, Code Leaks & more

RDP:Remote, ‘Wormable’ Pre-Authentication Windows Vulnerability”

Microsoft has issued an warning that another ransomware outbreak similar to Wannacry can shut down the internet. There is a critical vulnerability (CVE-2019-0708) in its RDP/Remote Desktop Services that can be exploited remotely, via RDP, without authentication and can be used to run arbitrary code. An attacker could then install programs, view, change, or delete data; or create… Read More »RDP:Remote, ‘Wormable’ Pre-Authentication Windows Vulnerability”

Business Impact Of COSMOS Bank Breach

Recently, you might have heard in news about COSMOS Bank Breach, a 112-year old cooperative bank in India and the second largest in the country being hacked and crores were siphoned off. COSMOS Bank has faced monetary  losses because of recently happened COSMOS Bank hack. And also they might have to face non-monetary losses like any other… Read More »Business Impact Of COSMOS Bank Breach

Security Breach Impacts and Top 10 Mitigation Techniques

News stories about Security breaches are increasing day by day. Security breach instances are growing at an alarming rate; while becoming faster and larger in scope.  Approximately 1500 companies are breached annually and the total records compromised nearly double each year. An organization must work quickly and accurately to navigate the terrain. The impact for… Read More »Security Breach Impacts and Top 10 Mitigation Techniques