top of page



Beware of Authentication Loopholes: How Google Fixed a Serious Workspace Weakness
Recently, Google discovered and swiftly resolved a critical authentication flaw in its Google Workspace service, which had the potential...
Sanket Kamble
Aug 8, 20242 min read


Internet Explorer Exploited in New Cyberattack: Urgent Action Required for Windows Users
Cybersecurity researchers have uncovered a new vulnerability, CVE-2024-38112, exploiting the retired Internet Explorer browser. Attackers...
Sanket Kamble
Jul 25, 20242 min read


The Unseen Protector: How Google's Darkweb Monitoring Keeps Us Safe
In today’s digital age, the internet is our playground, our workspace, and our marketplace. But beneath the surface of the web, we know...
Sanket Kamble
Jul 16, 20243 min read


New Attack Technique Exploits Microsoft Management Console Files: What You Need to Know
A novel attack technique, codenamed GrimResource, has been discovered that exploits Microsoft Management Console (MMC) files to gain full...
Sanket Kamble
Jun 29, 20242 min read
bottom of page


