spot_img

Topics: Hacking

The Rise of Cyber Cartels: How the Dark Web Fuels Digital Extortion?

In 2025, cybercrime has evolved beyond individual hackers or little ransomware criminal gangs into something greater, more organised, and just as dangerous: Cyber cartels....

The Human Edge of AI: ManageEngine’s Subhalakshmi Ganapathy on Redefining Enterprise Security in the Cloud Era

Speaking with TechGraph, Subhalakshmi Ganapathy, Chief IT Security Evangelist at ManageEngine (Zoho Corp), discussed how the rapid adoption of hybrid and multi-cloud environments is...

Why Do Cyber Criminals Target Human Psychology, and How Can We Outsmart Them?

In previous decades, the primary efforts of cybersecurity have centered around the construction of digital barriers, such as firewalls, antivirus systems, and intricate encryption....

Redefining Cyber Defense: Ankit Sharma on How Cyble AI Is Strengthening Enterprise Security

Speaking with TechGraph, Ankit Sharma, Senior Director and Head of Solutions Engineering at Cyble, discussed how security teams today face an overwhelming volume of...

Ethical Concerns in Deploying Agentic AI for Cybersecurity

Imagine that it's 3 AM and your company's AI security system just blocked what it thought was a sophisticated attack. No human intervention was...
- Advertisement -

Data Diodes: Using Physics to Stop Trojan Horses at the Gate

Data diodes are the ultimate jugaad solution in the world of high-tech cybersecurity. The term jugaad, rooted in the Indian ethos of innovative, frugal,...

Shopper’s Anxiety in the Age of OTP Scams

As online scams make it to the news headlines every day, the fear of falling prey to this exploitation is very real. Digital transactions...

How Proactive Threat Intelligence Prevents Fraud Before It Starts

The threat landscape of cybercrime is changing at a faster rate than a chameleon changes its color. But defensive tactics? Well, it takes a...

Why data breaches are getting costlier in India

A data breach occurs when unauthorized individuals gain access to confidential or sensitive information, compromising the integrity and security of an individual or a...

Top Cybersecurity Practices for Small Businesses: Why a VPN is a Must-Have

In today's hyperconnected world, small businesses face a growing number of cybersecurity threats that can cripple operations and erode customer trust. From phishing attacks...
- Advertisement -

The Importance of Zero-Trust Security Models in Safeguarding Data

In an age where cyberattacks grow more sophisticated by the day, traditional security models are no longer enough to safeguard sensitive data. The zero-trust...

Indusface Launches CyberShiksha program to Educate Students on Cybersecurity

Indusface, a leading application security provider for SaaS solutions, has launched CyberShiksha, a national initiative to improve cybersecurity awareness among students. India has emerged as...

The Role of Behavioral Biometrics in Online Fraud Protection

The modern-day hacker has an almost unlimited repertoire of potential attack vectors to choose from when aiming to steal financial or private information from...

Don’t Get Hacked: Why Is Cyber Security So Important To Businesses?

In the wild, a brightly colored bird with no natural defenses becomes easy prey. In the digital jungle, businesses with weak cyber security are...

Don’t Let Your Identity Get Stolen

Identity theft is getting more common. Thirty-three percent of Americans have already been victims. You don’t want to join them if you can help...
- Advertisement -

Why You Need to Be Serious About Cybersecurity for Your Business

The digital age has redefined how businesses communicate, advertise, and share information. Cyber threats are also becoming more frequent and sophisticated. Businesses need to...

Reaping the Benefits of Zero Trust

The advent of emerging technologies such as robotic process automation, artificial intelligence, and blockchain, as well as heightened security concerns due to the pandemic,...

The Complete Guide to US Proxies and Their Uses

A proxy server is a server that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to...

NCFTA partners with Binance to prevent cryptocurrency fraud

Global cryptocurrency wallet company, Binance has announced its partnership with the National Cyber-Forensics and Training Alliance (NCFTA) to prevent frauds on its platform. Binance is...

Can You Find Out Who Is Tracking Your Online Browsing Activities?

What do you do when you find out that someone is following you on the road?  Or, do you like it when someone is keeping...
- Advertisement -

10 Cybersecurity Practises that a Small Business must adopt

Are you just starting to provide your services or products to customers? Have you hired a security guard to protect your workplace or your...

Interview: “Cybersecurity is a moving target which requires skill-based training,” RV Raghu of Versatilist Consulting India

In an interview with TechGraph, the Director of Versatilist Consulting India, and Former ISACA board director, RV Raghu talked about the adoption of cyber...

Tamil Nadu PDS system breached, data of 4.5 Mn people on sale: Technisanct reports

Technisanct, cybersecurity, and big data startup headquartered in Bangalore report a data breach of over 4.5 million citizens from the Public Distribution System (PDS)...

Trends in the dark web

Dark Web has been a repository of all evil, blasphemy and notorious since its inception, with its evolving trends and cutthroat techniques chiselling out...

Struggling with Slow-Moving Internet? Here are Ways to Increase it!

Does a slow internet speed worry you? Well, in this fast-paced life, a fast internet connection is a must-have. Without it, sending files, downloading...
- Advertisement -

The Future Of Remote Working Tech

Globally, the workforce is undergoing a technological shift of massive proportions. Known as the 'Fourth Industrial Revolution', this phenomenon is evidenced by the 159%...

BigBasket data on sale for Rs 3 million on dark web

India-based online grocery platform, BigBasket on Sunday said, It has reportedly filed a police complaint with the cybercrime cell in Bengaluru after Cyber intelligence...

Trends in IAM – A Look-in

With the new normal after the Covid pandemic, the Digital Security space in general and Identity and Access Management (IDAM) in particular has become...

FireEye’s mandiant launches its new SaaS threat intelligence suite

Leading intelligence-led security company, FireEye has announced the launch of Mandiant Advantage - a SaaS threat intelligence suite on Tuesday. In a statement issued, FireEye...

Prime Minister Scott Morrison: Sophisticated state-based actors trying to hack Australian organizations

Addressing the Press on 18th June 2020, Prime Minister of Australia Scott Morrison said, "A 'Sophisticated state-based actor' has been trying to hack a...
- Advertisement -
spot_img

Trending

THE SNAPSHOTS

Sign up to get quick snaps of everyday happening, directly in your inbox.

We don’t spam! Read our privacy policy for more info.