For quite sometime now, iNSYNQ was under the scrutinizing eyes on various social networks platforms as well as on webContinue reading
Author: Jaya Sharma
Amazon Phishing Scam Uses Fake Login Prompts in PDF
Attackers use pdf attachments that prompt logins to appear valid for many. They utilize fake JavaScript login forms that are produced by the PDF attachment instead of using fake landing pages.
What is the Importance of Vulnerability Assessment?
Vulnerabilities are the anomalies such as programming errors or configuration issues of the system. Attackers exploit the weaknesses in the system andContinue reading
How VAPT Prevents Privilege Escalation Attacks?
Privileges are the permissions or right given to the user or group of systems for performing tasks that are neededContinue reading
25 million patients affected in AMCA data breach!
Last two years have been loaded with incidents of data breach on the healthcare sector. However, AMCA data breach is oneContinue reading
Hydro-Québec utility becomes the victim of triple cyber attack!
Hydro-Québec is a Canadian public utility company that manages the generation, transmission as well as the distribution of electricity inContinue reading
Equifax to pay $700 million as settlement for the largest data breach
Due to Equifax data breach what happened, is the credit reporting company has to pay up to $700 million forContinue reading
Bulgaria suffers from the biggest data breach in its history
Bulgaria, an East European country, has suffered from the biggest data breach in its history that has resulted in the compromiseContinue reading
UK becomes the biggest victim of a newer form of Phishing attack!
em A decade ago, the ‘spray and pray’ method was extremely popular for sending out phishing emails. This involved sendingContinue reading
Why is Employee Risk Score Necessary?
It was found in many of the surveys that most of the cyber-attacks are successful because of the negligence onContinue reading