2 million network storage devices affected by unpatched zero-day vulnerabilities!

2 million network storage devices

Network storage devices (NAS), are critical for small and medium businesses as it adds to the extra storage space when these business are running out of space. Critical shortcomings have been discovered in the NAS devices such as WD my book, SeaGate home, Medion Lifecloud, Netgear Stora. This critical vulnerability allows actors to exploit the […]

Continue reading


Facebook’s massive Data breach: what you need to know

facebook data breach

The worries for facebook do not seem to stop with cambridge analytica and this time around it’s a massive data breach of almost 50 million user accounts and another 40 million which are at risk, the vulnerability allowed hackers to take direct access to all these accounts information. As per Facebook, the bugs that enabled […]

Continue reading


World’s largest companies have adopted to DMARCs reject policy

Large companies across the world receive phishing emails every day. There are a number of these companies who are still not aware of DMARC, however, a large number of big companies have started following DMARC policies. Companies that have adopted DMARC have seen impressive results in the fall of suspicious emails entering the company domain […]

Continue reading


Mitre ATT&CK Framework: A boon to your company’s Red Team

MITRE ATT&CK

The MITRE ATT&CK Framework has become increasingly popular over the last few years. It was originally developed to support Mitre’s cyberdefense work but at this point it is both an enormous knowledge base of cyberattack technology and tactics and a model for understanding how those elements are used together to penetrate a target’s defenses. The […]

Continue reading


Are your website images secured?

googleusercontent

Malware can enter your machine through corrupted images on any website. Malware is stored in Exchangeable Image File Format (EXIF) data. Recently instances have occurred where in hackers are hiding malware in the images and uploading such images to the Google’s official CDN (Content Delivery Network) – googleusercontent.com. How malware is embedded in an image? […]

Continue reading