Writer Profile

Club Member

Garima Kejriwal

Connect

I am Garima, an enthusiast who's recently been introduced to the domain of cybersecurity and can't wait to dive into the field. I remember I started writing when I was 9, that's when I wrote my first poem and ever since, I've never stopped. I have only explored more each day with my writing style and the content I work on. I love writing about social issues and fiction. Apart from the time I'm not writing, I'm reading a lot. So, anytime you have a book recommendation, do let me know. Sidelining the geeky part, I watch a lot of thriller and rom-coms(not guilty at all). I also have a varied taste in music, from The Beatles to 5 Seconds of Summer, you'll find me humming to random tunes throughout the day.

Articles by Garima

VULNERABILITIES

Verifone and Ingenico—security issues and vulnerabilities in POS terminals

4 years ago

Security vulnerabilities were discovered in two leading manufacturers of point-of-sale terminals technology, Verifone and Ingenico,... Read more

BREACHES

Gitpaste-12 Worm - Sneaking through the Systems

4 years ago

The Gitpaste-12 worm has been brought into the limelight once again, a few weeks after... Read more

FRAUDS AND SCAMS

WhatsApp Scam: OTP gives hackers access

3 years ago

With over two billion active monthly users, WhatsApp is the most recent target for hackers... Read more

BREACHES

Data of over 20 million Big Basket Users Leaked

3 years ago

Over the weekend, the personal data of over 20 million Indian users were leaked on... Read more

BREACHES

Domino’s India under fire again—over 18 crore users' data compromised

3 years ago

After a recent series of data breaches, the next company targeted is the renowned pizza... Read more

VULNERABILITIES

Major websites down due to Fastly config error

3 years ago

Thousands of websites, including government portals, news, and social media sites, stopped responding on Tuesday,... Read more

VULNERABILITIES

Hidden Linux RPM bug discovered after decades

3 years ago

Red Hat has used RPM for software package distribution for decades with no prior known... Read more

VULNERABILITIES

'Bad Example' by Accenture for lack of transparency during ransomware attacks

3 years ago

When ransomware and cyber-attacks are at an all-time high, solution providers believe that high profile... Read more

VULNERABILITIES

Web Shells and Ransomware transmitted exploiting ProxyShell Vulnerabilities

3 years ago

The Cybersecurity and Infrastructure Security Agency (CISA) has recently warned that various attackers use three... Read more

POLICIES AND REGULATIONS

UN Members Seek New Cyber Discussions Amid Rising Ransomware Attacks

3 years ago

Researchers say that although the number of countries responding to the growing number of ransomware... Read more

VULNERABILITIES

Known Bug Being Abused by Iranian Hackers Found in Microsoft's MSHTML

3 years ago

Instagram and Google credentials of Farsi-speaking individuals around the world are being stolen by... Read more

VULNERABILITIES

Log4J—The Latest Cybercrime Storm

3 years ago

Log4j vulnerability has kickstarted a storm in the cyber world. Being famously called "a Fukushima... Read more