#Cybersecurity

11 Articles

Breification 32: Top 3 Vulnerability Methods That Can Easily Jailbreak ChatGPT 4 & 4o

Understanding these potential vulnerabilities is the first step towards building more secure AI systems. By staying informed and implementing robust security measures, we can harness t

Biggest data leak: Aadhaar Personal data of 81.5 crore Indians on sale on dark web

Although no official response has been issued by the Indian Council of Medical Research (ICMR) or the government, there are reports suggesting that the Central Bureau of Investigation (CBI) may invest

Top 5 ways to Run Your Startup Efficiently Without Breaking the Banks

The journey of a startup entrepreneur is daunting, with challenges like resource constraints and stiff competition making life tough. You cannot imagine sustenance and growth without embracing technol

Hackers’ attacks over data of 500 million WhatsApp users leaked online

Meta Platforms is getting surrounded with unwanted challenges one after another. A new report claims that a hacker hacked WhatsApp and stole personal data from around 500 million users. To make the si

Week Rewind 73: Last Week in a Quick Snap

Week Rewind 73, you will get all the quick rewinds of last week, including hot topics and new innovations. Last week from 20th June 2022 to 26th June 2022,  was a wonderful week in terms of

VPN termination is only the start. The CERT-In cybersecurity guidelines will impact several players

The abbreviation "VPN" refers to a service that safeguards your Internet connection as well as your privacy while you are using the internet. It does this by creating an encrypted tunnel for your data

Breification B2: Is Xiaomi remotely censor on its users' smartphones

Breification  Breification works on the principle of short duration & long-lasting. Breification is the combination of multiple segments which uses comes across daily and they only ha

Your iPhones may have connecting issues, Wi-Fi disable with certain names

Security researcher Carl Schou mentioned in his Twitter post that after joining a Wi-Fi network with the name “%p%s%s%s%s%n” his iPhone’s Wi-Fi functionality was left permanently dis

How to block and report text spam

We usually share our number over the internet when we see some exciting offer in exchange for that. This lead to the Spam text, which is really annoying and irritating. You immediately stop and start

BigBasket 2 crore users data leaked & sale on Dark Web

In the course of our routine dark web monitoring, the research team at Cyble found the database of BigBasket for sale in a cybercrime market, being sold for over $40,000. The leak contains a database