Have Any Questions?
Call Now +91 8317 490 210
Read the latest news and insights from our blog

Blog

Broken Access Control

Broken Access Control

Gaurish Bahurupi
September 9, 2024

Broken access control vulnerability occurs when an application fails to enforce proper authorization checks, allowing users to access resources or per...

Learning from Real-World Phishing Attacks

Learning from Real-World Phishing Attacks

Amit Bisht
August 13, 2024

Understanding the Growing Threat of Phishing Attacks in India and How Simulations Can Shield Your Organization from Catastrophic Losses

RansomEXX targeting Indian Banks

RansomEXX targeting Indian Banks

P Mohanty
August 2, 2024

RansomEXX targeted a supply chain unit Brontoo Technology Solutions, a key collaborator with C-EDGE, that provides solutions to the Indian Banking ...

The mutex vaccine for malwares

The mutex vaccine for malwares

Abhijit Mohanta
August 2, 2024

A lot of malware creates mutex when they are executed on the victim machine. With the presence of the mutex, they ensure that another instance of the ...

A pointer that  brought the world to a standstill

A pointer that brought the world to a standstill

Abhijit Mohanta
July 21, 2024

A minor bug in a kernel driver of one of the most popular Endpoint Detection and Response (EDR) solutions, CrowdStrike caused a Blue Screen also known...

Snowblind malware hidden threat android banking security

Snowblind malware hidden threat android banking security

Intelliroot
June 29, 2024

Snowblind, a new banking malware, is a sophisticated and insidious threat designed to exploit vulnerabilities in Android security features. This malwa...

Top eight Malware Types org should defend

Top eight Malware Types org should defend

Intelliroot
June 26, 2024

Malware, a malicious software, provides cybercriminals with unauthorized access to computer systems. It includes various types of software code, each ...

Ransomware - A Growing Threat to Cybersecurity

Ransomware - A Growing Threat to Cybersecurity

Priyabrata Mohanty
June 14, 2024

In recent years, ransomware attacks have emerged as one of the most prevalent and damaging forms of cyber threats. It is crucial to understand the nat...

Mail bombing

Mail bombing

Priyabrata Mohanty
June 10, 2024

Mail bombing overwhelms an inbox with excessive emails, disrupting communication and potentially crashing servers. Preventing it requires spam filters...

Identity Theft

Identity Theft

Priyabrata Mohanty
June 10, 2024

Identity theft, a silent menace, involves stealing personal data for fraud. It causes financial loss and emotional distress, emphasizing the need for ...

Comprehensive guide to penetration testing

Comprehensive guide to penetration testing

Priyabrata Mohanty
May 28, 2024

In the ever-evolving cybersecurity landscape, penetration testing allows you to identify vulnerabilities before malicious actors can exploit them, for...

The costly Human Error

The costly Human Error

Priyabrata Mohanty
May 16, 2024

Our approach to protecting Information has always been focused on securing the digital assets that store, process, and transfer information. With incr...

Understanding DDoS Attacks

Understanding DDoS Attacks

Team Intelliroot
May 13, 2024

In today's rapidly changing landscape of cybersecurity threats, Distributed Denial of Service (DDoS) attacks are considered as a formidable challenge ...

Process Hunting Toolkit

Process Hunting Toolkit

Abhijit Mohanta
May 8, 2024

Most of the time threat hunting is initiated by looking at the network logs or IDS IPS logs. But relying only on network logs may be enough as malware...

Zigbee Protocol Security

Zigbee Protocol Security

Sandeep Vishwakarma
April 2, 2024

Zigbee, a wireless communication standard developed by the Zigbee Alliance, operates on the IEEE 802.15.4 radio frequency, specializing in low-power, ...