Organization:NTT DATA Location:On-site Working Experience Required:Entry to Mid-Level (Based on knowledge and application) Job Description:Make an … Associate Information Security Analyst | NTT Data – Mumbai, IndiaRead more
Author: Rakesh
What is DLL hijacking? Risks, detection & prevention
Introduction — what is DLL hijacking? DLL hijacking is a class of software vulnerability where an … What is DLL hijacking? Risks, detection & preventionRead more
EDR-Redir V2: New bind-link evasion technique — what defenders need to know
A recent research disclosure from security researcher TwoSevenOneT describes EDR-Redir V2, an evolution of a filesystem … EDR-Redir V2: New bind-link evasion technique — what defenders need to knowRead more
Agent Session Smuggling: The Emerging Threat to AI Security
Security researchers have uncovered a sophisticated new cyberattack that targets the growing network of AI agent … Agent Session Smuggling: The Emerging Threat to AI SecurityRead more
Akira Ransomware Group Claims Massive Apache OpenOffice Breach
On October 29, 2025, the notorious Akira ransomware group announced it had breached the systems of Apache OpenOffice, stealing a … Akira Ransomware Group Claims Massive Apache OpenOffice BreachRead more
What Is Microsoft Researcher with Computer Use in Microsoft 365 Copilot?
Microsoft Researcher with Computer Use is a groundbreaking new capability inside Microsoft 365 Copilot that allows … What Is Microsoft Researcher with Computer Use in Microsoft 365 Copilot?Read more
What Is Deep Packet Inspection (DPI) in Cybersecurity?
Deep Packet Inspection (DPI) is an advanced network analysis technology that examines the content of data … What Is Deep Packet Inspection (DPI) in Cybersecurity?Read more
China’s Great Firewall Breach: A Deep Dive into Digital Surveillance
In September 2025, a seismic cybersecurity incident rattled the foundations of one of the world’s most … China’s Great Firewall Breach: A Deep Dive into Digital SurveillanceRead more
Lampion Trojan Resurfaces: How a Banking Malware Evolved into a Sophisticated Threat
A new wave of cyberattacks is shaking the financial sector in Portugal. Researchers have uncovered … Lampion Trojan Resurfaces: How a Banking Malware Evolved into a Sophisticated ThreatRead more
The Rise of PolarEdge: Inside a Massive IoT Botnet Powering Global Cybercrime Infrastructure
A sophisticated botnet campaign known as PolarEdge has compromised more than 25,000 Internet of Things (IoT) … The Rise of PolarEdge: Inside a Massive IoT Botnet Powering Global Cybercrime InfrastructureRead more