• Meet us at Aegis Graham Bell Awards, The Ashok Hotel, Delhi – Booths 36, 37, 58 & 59! Upcoming Event

Research & Technology

post image

Understanding CVE-2024-1086: A Critical Local...

What is CVE-2024-1086? 

CVE-2024-1086 is classified as a local privilege escalation vulnerability, enabling attackers with basic system access to execute code with elevated privileges. What does...

+ Read More
post image

How Capture the Flag (CTF) Challenges Help Teams...

If you've ever played the childhood game of "Capture the Flag," you understand the basic premise: opposing teams race to infiltrate each other’s territory, seize the flag, and return it to their...

+ Read More
post image

The 2024 AIIMS Ransomware Attack: A Case in Point

One of India's top medical facilities, AIIMS, was the target of a serious ransomware attack in the beginning of 2024 that had far-reaching effects. Critical hospital data, such as patient information...

+ Read More
post image

Twilio's Authy Breach: How 33 Million Phone...

In a statement given to TechCrunch, Twilio spokesperson Kari Ramirez  said “The company has detected that threat actors were able to identify data associated with Authy accounts, including phone...

+ Read More
post image

Spring4Shell: Exploring the Exploitation of...

The development and deployment of applications is a complex process that often introduces weaknesses or flaws in a system's software, hardware, or processes. Such weaknesses / flaws that attackers...

+ Read More
post image

Solo Mode for Personal Development: Enhancing...

As the digital landscape grows, so does the scale and complexity of cyber threats, making the stakes in cybersecurity higher than ever. Defending against these threats can be likened to preparing for...

+ Read More