Home Search

rudra srinivas - search results

If you're not happy with the results, please do another search
digital assets on dark web forums, Know the Worth of Your Data on the Dark Web Price Index 2021

3 Digital Assets That Are High in Demand on Dark Web Forums

The demand for trading sensitive stolen data and other malicious activities has reached new highs across underground dark web marketplaces. The global pandemic and related...
Friday Podcast, CISO MAG

The Friday Podcast: The Big Stories for the Week (15 October 2021)

In the Friday Podcast Episode 7, we tell you about the big stories our cybersecurity editors produced this week. CYBERSECURITY AWARENESS MONTH October is designated as...
Phishing email

How To Find a Phishing Email [INFOGRAPHIC]

Protecting personal information from adversaries has become a challenge for both individuals and organizations. Cybercriminals are leveraging advanced phishing and social-engineering techniques to trick...
Friday Podcast, CISO MAG

The Friday Podcast: The Big Stories for the Week (8 October 2021)

In the Friday Podcast episode 6, we tell you about the big stories our cybersecurity editors produced this week. RSS: https://feeds.soundcloud.com/users/soundcloud:users:899202688/sounds.rss Spotify: https://open.spotify.com/show/7pBhvwEVAaL4uUJnzD5rWO October is designated as...
CyberSmart

How to Be CyberSmart This Cybersecurity Awareness Month

The cybersecurity landscape continues to evolve, with threat actors leveraging new hacking techniques to penetrate and exploit critical infrastructure. While organizations are worried about...
Honeypot

How Honeypots Boost Organizations’ Security

Cybercriminals often leverage various phishing lures to attract unwitting users. Similarly, security professionals also rely on the honeypot technique to attract cybercriminals and find...
Common IoT Attacks

3 Common IoT Attacks that Compromise Security

The explosion of IoT technologies incited users and organizations to swiftly adopt IoT devices to enhance process control and boost productivity. The rise of...
Credential stuffing attacks

What are Credential Stuffing Attacks and How to Prevent Them

Thwarting cyberattacks has become highly complicated today. Unauthorized intrusions have seen a surge despite security measures implemented by internet users and corporates to safeguard...
Man-in-the-Middle Attack

What is Man-in-the-Middle Attack and How to Prevent them

Man-in-the-middle (MITM) attacks are gaining importance in the cyberattack landscape as threat actor groups are leveraging it more often to harvest users’ sensitive data...
National Coding Week

National Coding Week 2021 Reminds Us About the Importance of Digital Literacy

Learning digital skills and gaining technical knowledge are essential in a rapidly changing digital world. People with no or minimal digital knowledge often fall...

MOST POPULAR

RECENT POSTS