Various major web services suffered due to an outage caused by cloud services provider Akamai Technologies DNS service. Content Delivery Platform, Akamai Technologies gave an alert on an “Edge DNS” service incident, noting a “partial outage” on its website and said it...
The classical theory of the security boundary is growing increasingly troublesome at the heels of highly publicized attacks. The boundaries are becoming nonexistent, as cloud-based architectures push back legacy systems. Adding on, the cyber kill chain is likewise altering into...
In the middle of intensifying border tensions between India and China, cybersecurity researchers have discovered a unified campaign against India’s hypercritical infrastructure, including country’s power grid, from Chinese state-sponsored groups. The attacks, which corresponded with the deadlock between the two nations in May...
Network security attacks are capturing headlines, often with information regarding the size of the attack, who was behind it, who all were affected and most importantly what all information was leaked or the severity of the attack. Mistakes are in human...
Attack methodologies keep evolving with emerging technologies like artificial intelligence, machine learning, cloud computing, etc, cybersecurity start-ups also embrace them to find an exit door. Analytics Insight has listed the top 100 cybersecurity start-ups of 2021 based on their product...
On Tuesday 4th May, Belgium government websites and services were disrupted after leading Internet Service Provider Belnet fell victim to a gigantic cyber-attack. At 11:00 CEST the company experienced a distributed denial of service (DDoS) attack which resulted in overwhelming Belnet’s servers and making their...
For as long as preserving privacy and device detection are taken into account, User-Agent HTTP headers text in italic are used to detect the browser and device information. Into the bargain, with the continuous growing demand for new features, the header size...
Serverless computing is an abstraction of infrastructure, servers, and operating systems. The term serverless doesn’t mean that servers are not any longer involved. It straight away means that developers no longer have time to think that much about them. Serverless...
In December 2020, US government agencies and private organizations were targeted with the ‘SolarWinds Attack’. A series of cyberattacks encountered, allegedly related to state-sponsored threat organizations which turned into one of the biggest cyberattacks across the globe. What were the real...