Writer Profile
Club Member
Connect
I am Parv Kohli a fellow fresher at MIT trying his very best to balance out his marks and K/D. You can always find me behind a computer screen or trying to click the perfect picture of the sunset. I wouldn't really call myself a coding enthusiast because I haven't had much past experience with it , but i love solving puzzles and brain teasers. I like to think myself as a caffeine addicted dog lover :P
BREACHES
38 million data records spilled by Microsoft power apps
3 years ago
Microsoft power apps is described as a service that enables users to build and use custom business apps that connect to their data and work across the internet. It saves them time and expenses for custom software development. The Microsoft Power apps portal has exposed personal data tied to 38... Read more
Microsoft power apps is described as a service that enables users to build and use... Read more
FRAUDS AND SCAMS
Chinese hackers targeted Indians with e-shopping scams
4 years ago
Festive season, end of the year sales, and offers on various shopping sites have given a window of opportunity for scammers to imitate sales campaigns like Amazon’s big billion days. Various bogus links are being spread all over WhatsApp and other messaging applications baiting people to participate in a contest... Read more
Festive season, end of the year sales, and offers on various shopping sites have given... Read more
BREACHES
Cisco Inc. fell prey to Russian cyber-attacks
4 years ago
Reports last week stated that a Russian government hacking operation compromised multiple U.S. government computer networks providing the first glimpse into a dangerous new type of cyberattack: using America’s software supply chain against it. Their recent target was Cisco Systems Inc., which is the world’s biggest manufacturer of network equipment... Read more
Reports last week stated that a Russian government hacking operation compromised multiple U.S. government computer... Read more
VULNERABILITIES
Bounty worth Rs 22 Lakh for a bug in Azure cloud systems
3 years ago
Bug bounty hunters are cybersecurity professionals or researchers who explore the web and find and fix bugs. They scan systems searching for vulnerabilities or flaws that hackers might use to sneak in and inform the companies about them. Aditi Singh, a 20-year-old ethical hacker from Delhi, is one such bounty... Read more
Bug bounty hunters are cybersecurity professionals or researchers who explore the web and find and... Read more
BREACHES
Pandemic has resulted in a spike in data breach costs, says IBM
3 years ago
According to Ponemon Institute's 'The Cost of a Data Breach Report,' sponsored and analyzed by IBM security, data-breach expenses have increased over 10% in the last year. The research considers various costs linked to Data Breaches, including legal, operations of technology, customer loss, brand worth, and a lot more aspects.... Read more
According to Ponemon Institute's 'The Cost of a Data Breach Report,' sponsored and analyzed by... Read more
BREACHES
GoDaddy security breach exposes 1.2 million WordPress users' data
3 years ago
The web hosting company Go Daddy recently submitted a filing to the securities and exchange commission on November 22, revealing that an unauthorized third party accessed the email addresses of almost 1.2 million WordPress customers. The Chief Information Security Officer, Demetrius Comes, said that they identified suspicious activity in their... Read more
The web hosting company Go Daddy recently submitted a filing to the securities and exchange... Read more
VULNERABILITIES
Cloud services used to distribute Netwire, Nanocore, and AsycnRat Malware
2 years ago
Malicious attackers have been using public cloud services from Amazon and Microsoft in their campaigns to deliver remote access trojans or RATS and use them to steal sensitive information from compromised systems. Employing existing infrastructure to support invasions is becoming more common. It eliminates the need for attackers to run... Read more
Malicious attackers have been using public cloud services from Amazon and Microsoft in their campaigns... Read more
RESEARCH AND DEVELOPMENT
Hackers use rogue websites to attack organizations with lateral phishing
2 years ago
Microsoft has disclosed details of phishing campaigns used to target organizations by using stolen credentials to register on devices on the victim's network and spread spam emails to increase the infection pool. Microsoft also said that the attack occurs through the accounts that were not secured using multi-factor authentication (... Read more
Microsoft has disclosed details of phishing campaigns used to target organizations by using stolen credentials... Read more
FRAUDS AND SCAMS
Hackers Planted Fake Digital Evidence on Devices of Indian Activists and Lawyers
2 years ago
Recently human rights activists, human rights defenders, academics, and lawyers across India have fallen prey to targeted attacks by a previously unknown hacking group. 'SentinelOne,' a cybersecurity firm, has attributed the intrusions to a group it tracks as "ModifiedElephant," which has been acting as a threat since 2012. ModifiedElephant's primary... Read more
Recently human rights activists, human rights defenders, academics, and lawyers across India have fallen prey... Read more