+91 9116117170


Advanced persistent threat attacks

By Devashish Soni 0 Comment February 24, 2020

What is APT An advance persistent threat attack is a stealthy computer network threat actor. Typically, a state or nation sponsored group perform this attack which gain unauthorized access to a computer network and remains undetected for a certain amount of time. The motivation of such kind of attack can be political or economic, these […]

Cloud Security Explained

By Aneesh A S 0 Comment February 24, 2020

Cloud security refers to the technologies , policies , applications and controls that secures cloud computing environments against insider and external cybersecurity threats. Cloud computing can be defined as the delivery of different services through the Internet. These services include applications and tools like data storage, databases, software and networking. Cloud computing has become essential […]

Obsolete Connected Medical Devices vulnerable to BlueKeep

By Aneesh A S 0 Comment February 24, 2020

Despite the fact that Microsoft has issued patches for the BlueKeep vulnerability almost a year ago, It’s been recently found by researchers from CyberMDX that more than 55 percent of medical imaging devices that include MRIs, XRays and Ultrasound machines are still running on outdated Windows versions that are vulnerable to the remote desktop protocol […]

What are Honeypots and how can it increase your security

By Yash Kudal 0 Comment February 20, 2020

What are honeypots? Honeypots can be defined as a trap that is used to detect attempts by any unauthorized use of information systems. Honeypots actually open the tables for hackers and computer security experts. The main purpose of a honeypot is to obtain or learn from attacks and to use other information to improve security. […]

IoT Security

By Yash Kudal 0 Comment February 20, 2020

Introduction IoT security is a technology area that interacts with protecting connected devices and networks in the Internet of Things (IoT). IoT involves adding the Internet connection to the system of compatible computer devices, mechanical and digital devices. Each thing is provided with a unique identifier and the ability to automatically transfer data to the […]

error: Content is protected by Cyberops !!