In May 2024, the UK Ministry of Defence (MOD) faced a significant social engineering attack targeting its payroll system, compromising the sensitive data of up to 270,000 serving personnel, reservists, and veterans. This exposed personal identifiable information, including names, bank details, and some addresses.   Attackers, believed to be state sponsored, exploited a third-party contractor’s system … Read more

The Claim In the recent news, chinese researchers claim to have used a D-Wave Advantage quantum computer to break specific encryption algorithms based on the Substitution-Permutation Network (SPN), a common structure in encryption. SPNs secure data by repeatedly substituting (replacing) and permuting (reordering) parts of it, and they are foundational to widely used encryption systems … Read more

In a recent significant cyberattack, over 2000 Palo Alto Network firewalls have been compromised by attackers exploiting two recently patched vulnerabilities. Palo Alto provides cybersecurity services to enterprises, government and service providers. According to UK based Shadow server Foundation the number of breaches in US and India on Palo Alto network firewalls were in the … Read more

Information is one of the most valuable assets for any business. Whether its customer data, financial records, intellectual property, or confidential information, keeping this information secure is essential to maintaining trust and ensuring smooth business operations. However, managing the security of this information can be challenging, especially with the constant threats businesses face from cyber-attacks … Read more