Dealing with the unprecedented rise of data breaches in India

data breaches in india

As per the recent study by Netherlands-based Virtual Private Network (VPN) Surfshark, data breaches have globally lowered by 58% in the first quarter of 2022. Although USA, Poland, and Russia are the most breached countries, […]

Australia is under attack!

Australia’s recent run of serious data breaches has left many commentators asking some very pressing questions. It seems as though there’s perhaps a lot more to it than meets the eye. Yes, one could describe […]

Phishing attacks – the biggest security threat to SMEs in the digital era

phishing attacks

Phishing has become a common word today, and although many people know what it means, they still fall prey to phishing attacks. Phishing is a type of social engineering, where hackers try to trick you […]

How do you evaluate an external cybersecurity vendor?

external cybersecurity vendor

With cybercrime on the rise, every organization, whether a large enterprise or a startup, should have expert cybersecurity professionals on the team, or onboard a trusted partners. Even if a company has an internal information […]

A guide to CIS Benchmarks

A guide to CIS Benchmarks

CIS benchmarks are specifically followed to secure applications at the configuration level. These activities include server hardening, cloud configuration reviews, browser or database hardening, etc. While OWASP provides insight on application security and common vulnerabilities […]

Withdrawing the Personal Data Protection Bill leaves Citizens Vulnerable

An analysis of India’s Personal Data Protection Bill, benefits and objections of various stakeholders. The government’s decision to withdraw the Personal Data Protection Bill 2019 so close to its implementation, comes as a surprise to […]

Open-source Intelligence

Have you ever thought that the Amazon AWS access credentials of your company can be found in GitHub? Assume that, your company is relying on amazon web service and GitHub and the web application server […]

Sensitive Files/Configuration Enumeration on Github

Version Control System: Version Control System (VCS) is a software that helps software developers to work together and maintain a complete history of their work. Listed below are the functions of a VCS:1. Allows developers […]

Misconfigured AWS S3 storage Bucket Enumeration

AWS S3 is easy-to-use object storage with a simple web service interface that you can use to store and retrieve any amount of data from anywhere on the web. Amazon S3 also allows you to […]

Addressing RBI compliance requirements for banks & NBFCs

RBI cybersecurity framework

Segasec and Entersoft to strengthen their partnership in India RBI cybersecurity framework Tel Aviv, February 13, 2019 – India is among the top four nations targeted by phishing attacks according to a recent research. Consequently, the Reserve […]