NIC-CERT Division, is the nodal arm of NIC for managing the cyber security incidents in NIC. NIC-CERT shall also issue periodic threat intelligence, Security Alerts/tips and advisories to safe guard NIC's assets against cyber threats.
National Informatics Centre - Computer Emergency Response Team (NIC-CERT) division is constituted with an objective of analyzing, monitoring and responding to cyber threats on critical government cyber infrastructure like websites, emails and various services. NIC-CERT coordinates with other stake-holders to mitigate the cyber threats by monitoring network for security incidents and issuing advisory for vulnerabilities.
The Tor Project has released a security update for the Tor Browser on Mac and Linux to fix a vulnerability that leaks users' real IP addresses.
It has become common for users to use Google to find information that they do not know. In a quick Google search you can find practically anything you need to know.
For several months Cybereason has been following the concerning rise of ONI, a family of ransomware involved in targeted attacks against Japanese companies.
In September 2017, we discovered a new targeted attack on financial institutions. Victims are mostly Russian banks but we also found infected organizations in Malaysia and Armenia.
Apple has patched iOS, macOS and other products to protect against the KRACK vulnerability recently disclosed in the WPA2 Wi-Fi security protocol.
Researchers have created an artificial intelligence system that can solve Captcha challenges, rendering them 'broken' and 'ineffective'.
It seems that malicious Google Chrome extensions are on the rise. A couple of months ago, I posted here about two of them  which stole user credentials posted on banking websites and alike
One day after clear ties were established between the Bad Rabbit ransomware attacks and this summer's NotPetya outbreak, researchers at Cisco today strengthened that bond disclosing that the leaked NSA exploit EternalRomance was used to spread the malware on compromised networks.
Evolution is an integral part when it comes to malware, as attackers need to be one step ahead of whitehats to evade detection.
Exploit kit (EK) use has been on the decline since late 2016; however, certain activity remains consistent. The Magnitude Exploit Kit is one such example that continues to affect users, particularly in the APAC region.
Cisco has released several updates to address vulnerabilities affecting multiple products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.
A remote code execution vulnerability exists when the Windows Host Compute Service Shim (hcsshim) library fails to properly validate input while importing a container image.
Security Tip: Keep your software patches up-to-date and use supported versions of software
|Remote Code Execution Vulnerability in Samba 3.5.0 Onwards.|
|Petya Ransomware Variant June 2017.|