A staggering 1M patients affected after a critical data breach at the Community Health Center

[sonaar_audioplayer albums=”243016, 243069, 243091, 243115, 243151, 243173, 243195, 243238, 243291, 243308, 243324, 243335, 243401, 243466, 243537, 243595, 243646, 243710, 243795, 243842, 243885, 243940, 244001, 244026, 244108, 244140, 244161, 244186, 244205, 244240, 244305, 244540″ progress_bar_style=”default” wave_bar_width=”1″ wave_bar_gap=”1″ player_layout=”skin_boxed_tracklist” show_track_market=”true”][/sonaar_audioplayer]   A significant data breach has occurred at the Community Health Center (CHC), a US-based nonprofit organization

View Full Post

GhostGPT- GenAI model that boosts cybercrime

[sonaar_audioplayer albums=”243016, 243069, 243091, 243115, 243151, 243173, 243195, 243238, 243291, 243308, 243324, 243335, 243401, 243466, 243537, 243595, 243646, 243710, 243795, 243842, 243885, 243940, 244001, 244026, 244108, 244140, 244161, 244186, 244205, 244240, 244305″ progress_bar_style=”default” wave_bar_width=”1″ wave_bar_gap=”1″ player_layout=”skin_boxed_tracklist” show_track_market=”true”][/sonaar_audioplayer]   Artificial Intelligence is dangerous when manipulated and exploited by threat actors. One such recent example of AI

View Full Post

Cybercriminals may try to misuse LA fire!

[sonaar_audioplayer albums=”243016, 243069, 243091, 243115, 243151, 243173, 243195, 243238, 243291, 243308, 243324, 243335, 243401, 243466, 243537, 243595, 243646, 243710, 243795, 243842, 243885, 243940, 244001, 244026, 244108, 244140, 244161, 244186, 244205″ progress_bar_style=”default” wave_bar_width=”1″ wave_bar_gap=”1″ player_layout=”skin_boxed_tracklist” show_track_market=”true”][/sonaar_audioplayer]   The LA fire has devastated the lives of 92,000 people. Around 12,000 homes, educational institutes, and businesses have burnt

View Full Post

Volkswagen data breach impacts a whopping 800K EV users!

The automotive industry is increasingly becoming a popular pick among threat actors. Because of its perceived vulnerabilities and dynamic trends, the automotive industry is no longer safe from the prying eyes of cybercriminals. The recent data breach at Volkswagen is no different. The cyber incident exposed the personal data of 800K EV customers!

DDoS attacks spike as Africa embraces rapid digitization!

DDoS attacks spike as Africa embraces rapid digitization!

[sonaar_audioplayer albums=”243016, 243069, 243091, 243115, 243151, 243173, 243195, 243238, 243291, 243308, 243324, 243335, 243401, 243466, 243537, 243595, 243646, 243710, 243795, 243842, 243885, 243940, 244001, 244026, 244108, 244140, 244161″ progress_bar_style=”default” wave_bar_width=”1″ wave_bar_gap=”1″ player_layout=”skin_boxed_tracklist” show_track_market=”true”][/sonaar_audioplayer]   Africa’s rapid digitization attempts have made it a prime target among threat actors. Jumping onto the digitization bandwagon just to stay

View Full Post

India witnesses a steep rise in the number of API attacks!

[sonaar_audioplayer albums=”243016, 243069, 243091, 243115, 243151, 243173, 243195, 243238, 243291, 243308, 243324, 243335, 243401, 243466, 243537, 243595, 243646, 243710, 243795, 243842, 243885, 243940, 244001, 244026, 244108, 244140″ progress_bar_style=”default” wave_bar_width=”1″ wave_bar_gap=”1″ player_layout=”skin_boxed_tracklist” show_track_market=”true”][/sonaar_audioplayer]   India has been experiencing an alarming rise in API (Application Programming Interface) attacks, with banking and utilities sectors emerging as primary targets.

View Full Post
Guidelines to follow to send emails to Gmail recipients

Guidelines to follow to send emails to Gmail recipients

[sonaar_audioplayer albums=”243016, 243069, 243091, 243115, 243151, 243173, 243195, 243238, 243291, 243308, 243324, 243335, 243401, 243466, 243537, 243595, 243646, 243710, 243795, 243842, 243885, 243940, 244001, 244026″ progress_bar_style=”default” wave_bar_width=”1″ wave_bar_gap=”1″ player_layout=”skin_boxed_tracklist” show_track_market=”true”][/sonaar_audioplayer]   Google has always prioritized protecting its users and preventing phishing attempts. To achieve this, it has established strict guidelines for sending emails to Gmail

View Full Post