top of page
![389187_f9a7ca820b3b43db8da2e0d0e5099385~mv2_edited_edited_edited.png](https://static.wixstatic.com/media/389187_fdcd73e1590f4132a76cf9aa6571e154~mv2.png/v1/crop/x_0,y_154,w_742,h_360/fill/w_155,h_75,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/389187_f9a7ca820b3b43db8da2e0d0e5099385~mv2_edited_edited_edited.png)
![GDPR violations landed Meta in serious trouble](https://static.wixstatic.com/media/389187_f73f5f4b0492435389450c3468f800a8~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/389187_f73f5f4b0492435389450c3468f800a8~mv2.webp)
Harisuthan
May 25, 20231 min read
GDPR violations landed Meta in serious trouble
As a violation of GDPR, Facebook’s owner, Meta, has been fined a record €1.2bn and ordered to suspend the transfer of user data from the EU
76 views0 comments
![Top 5 Free Resources to Kickstart Your Cybersecurity Journey : Part 01](https://static.wixstatic.com/media/389187_4d5076912e784b799ef8d55e6b49890d~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/389187_4d5076912e784b799ef8d55e6b49890d~mv2.webp)
Nithyalakshmi Sivakumar
May 17, 20232 min read
Top 5 Free Resources to Kickstart Your Cybersecurity Journey : Part 01
Cyber security is one of the ever evolving fields where one can constantly learn and grow. Nowadays everything is digitalized thus it is nec
251 views0 comments
![Anti-Ransomware Day](https://static.wixstatic.com/media/389187_592f1c3fd0b84d95a438a31d57edaa27~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/389187_592f1c3fd0b84d95a438a31d57edaa27~mv2.webp)
Harisuthan
May 13, 20231 min read
Anti-Ransomware Day
Team INTERPOL has been officially announced May 12 as Anti-Ransomware Day, Ransomware attacks are becoming more prevalent and sophisticated,
173 views0 comments
![World password day](https://static.wixstatic.com/media/389187_7035619407804702a4ca7d3c056d498e~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/389187_7035619407804702a4ca7d3c056d498e~mv2.webp)
Harisuthan
May 5, 20232 min read
World password day
World Password Day is an event celebrated on first Thursday in May. It was developed to spread awareness about the value of creating secure
101 views0 comments
![How to make your life more secure online](https://static.wixstatic.com/media/389187_538616edfdf344e6828ac01aecddbcf2~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/389187_538616edfdf344e6828ac01aecddbcf2~mv2.webp)
ABISHEK R
Feb 14, 20232 min read
How to make your life more secure online
In the digital age, it's more important than ever to stay vigilant and protect your digital information. Cybersecurity is the practice of...
72 views2 comments
![Never Ending Cyber Attacks: Part 1](https://static.wixstatic.com/media/389187_7777a248134a4819aec863a4d0c26fcc~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/389187_7777a248134a4819aec863a4d0c26fcc~mv2.webp)
Mohan Kumar
Feb 12, 20232 min read
Never Ending Cyber Attacks: Part 1
Cyber-attacks, Ukraine, Estonia, Russia, BlackEnergy, KillDisk, Worm, DDos, TDoS, SCADA We have encountered a variety of devastating...
155 views0 comments
![Things that you need to know about cybersecurity](https://static.wixstatic.com/media/389187_26c4a2d169c141019268c5b7fd8b9301~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/389187_26c4a2d169c141019268c5b7fd8b9301~mv2.webp)
ABISHEK R
Feb 5, 20231 min read
Things that you need to know about cybersecurity
Cybersecurity is an increasingly important topic that everyone should be aware of. With the rise of digital technology, it is important...
39 views0 comments
![Basic Infosec Terminologies](https://static.wixstatic.com/media/389187_d13175266f8f4ea48caec4055c6d826c~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/389187_d13175266f8f4ea48caec4055c6d826c~mv2.webp)
ABISHEK R
Jan 29, 20232 min read
Basic Infosec Terminologies
Information security is an important topic for businesses, organizations, and individuals, as it concerns the protection of sensitive data f
110 views1 comment
![Into Ethical Hacking](https://static.wixstatic.com/media/389187_41bdbb94ab664c04aa19c46a3bc00fd4~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/389187_41bdbb94ab664c04aa19c46a3bc00fd4~mv2.webp)
ABISHEK R
Jan 15, 20231 min read
Into Ethical Hacking
Have you heard of hacking? Most of you must be familiar with the word “Hacking” for sure. Yes!, As you think, Hacking is illegal but...
171 views5 comments
![CVE-2022-37958 | SPNEGO Extended Negotiation (NEGOEX) Vulnerability](https://static.wixstatic.com/media/389187_d815d49e5c724a9dac9ad5965a7084e8~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/389187_d815d49e5c724a9dac9ad5965a7084e8~mv2.webp)
Harisuthan
Dec 21, 20221 min read
CVE-2022-37958 | SPNEGO Extended Negotiation (NEGOEX) Vulnerability
A recently discovered security vulnerability at SPNEGO Extended Negotiation (NEGOEX) will result in remote code execution at the windows...
402 views1 comment
![Google Pixel lock screen bypass vulnerability | CVE-2022-20465 | tCc.](https://static.wixstatic.com/media/389187_702555ac082f4a198f2b47b02e1faef1~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/389187_702555ac082f4a198f2b47b02e1faef1~mv2.webp)
Harisuthan
Nov 13, 20222 min read
Google Pixel lock screen bypass vulnerability | CVE-2022-20465 | tCc.
A recently discovered login bypass vulnerabilities Google Pixel 6a allows an attacker to bypass the lock screen authentications to gain comp
348 views0 comments
![Working Of Threat Hunting](https://static.wixstatic.com/media/389187_5be7edd406814fb5bd0c75420ae9b847~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/389187_5be7edd406814fb5bd0c75420ae9b847~mv2.webp)
Harisuthan
Jun 23, 20221 min read
Working Of Threat Hunting
Team threat hunters are front-line defenders who proactively detect malicious or suspicious activity by investigating internal systems in...
159 views0 comments
![Cyber Threat Intelligence](https://static.wixstatic.com/media/389187_4ff6c7e7c89b45f1958382ca010283de~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/389187_4ff6c7e7c89b45f1958382ca010283de~mv2.webp)
Keerthana Partheeban
May 29, 20222 min read
Cyber Threat Intelligence
Organizations face a lot of threats in their day-to-day basics. Cyber threat intelligence is the evidence-based knowledge about existing...
92 views0 comments
![Types Of Intrusion](https://static.wixstatic.com/media/389187_4cc6eeb189d74db6995dc56d310d9a91~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/389187_4cc6eeb189d74db6995dc56d310d9a91~mv2.webp)
Harisuthan
May 24, 20221 min read
Types Of Intrusion
In-general intrusion is an process/technique to penetrates into an system/organization by exploiting the vulnerabilities, this specific...
172 views0 comments
![The Authentication](https://static.wixstatic.com/media/389187_760c7ba5dd3541ceabae8af7aa983c7a~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/389187_760c7ba5dd3541ceabae8af7aa983c7a~mv2.webp)
Harisuthan
May 21, 20221 min read
The Authentication
A process of validating a legit user by validating with a unique identity, Authentication provides restrictions over physical and logical as
42 views0 comments
![Access Control](https://static.wixstatic.com/media/389187_3d973f06cf4e459896e818b7a3dcf7d0~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/389187_3d973f06cf4e459896e818b7a3dcf7d0~mv2.webp)
Harisuthan
May 14, 20221 min read
Access Control
The process or an technique to implement restriction or adding addition form of security to prevent un-authorized user from both physical...
66 views0 comments
![Basic of Cloud Computing](https://static.wixstatic.com/media/389187_25e40f9f33a648b9a7a5229e0ba5b1d5~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/389187_25e40f9f33a648b9a7a5229e0ba5b1d5~mv2.webp)
SATHISH R
May 10, 20222 min read
Basic of Cloud Computing
Cloud computing is the practice of using remote servers hosted on the internet to store, manage, and process data rather than a local server
104 views1 comment
![Cyber Security as a Career Choice](https://static.wixstatic.com/media/389187_ba184548339d4cc0a66b056dc107c509~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/389187_ba184548339d4cc0a66b056dc107c509~mv2.webp)
Keerthana Partheeban
May 6, 20222 min read
Cyber Security as a Career Choice
Cyber security continued to grow even throughout the global pandemic. Cybercrime is growing increasingly frequent, with targets ranging fro
317 views5 comments
![Basic Cyber Security Practices](https://static.wixstatic.com/media/389187_0195db7ce73a4021ab01a89515d922c4~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/389187_0195db7ce73a4021ab01a89515d922c4~mv2.webp)
Harisuthan
Apr 29, 20222 min read
Basic Cyber Security Practices
In the world of cyber security many organizations are keep on investing millions of dollars to field of cyber security as per recent...
109 views0 comments
![Basic of Cyber Security ?](https://static.wixstatic.com/media/389187_2dbf3e24b3064b4886a0174a602247ae~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/389187_2dbf3e24b3064b4886a0174a602247ae~mv2.webp)
-
Apr 28, 20221 min read
Basic of Cyber Security ?
Cyber security is an process or an technique to pro-activity defend against the cyber attacks, due to an tremendous development of technolog
155 views1 comment
bottom of page