Manoharan Mudaliar

Cyber Security Consultant

News

The Most Common Attack Vectors for Ransomware

An attack vector is a path which attackers can exploit to gain unauthorized access into a network or ...
Guide to Web Application Pen-Testing

A Useful Guide to Web Application Pen-Testing

Penetration testing, or pen testing for short, is one of the most commonly used cybersecurity protocols for web ...
Hardware End-of-Life Data Breaches

Hardware End-of-Life Data Breaches: What You Need to Know

Cyber threats and cybersecurity go hand in hand; as one evolves, so must the other. As cybercriminals modify ...

Cisco Releases Major Security Updates on Various Platform

Cisco Security Advisory team releases security updates that address a vulnerability in multiple products. Summary Most of the ...

Google Chrome Releases Critical Updates

Summary Google released Chrome version 81.0.4044.138 for Windows, Mac, and Linux. It addresses vulnerabilities that an attacker could ...

COVID-19 CYBER WARNING BY CISA & NCSC

The U.S. Department of Homeland Security (DHS), the United Kingdom’s National Cyber Security Centre (NCSC), and Cybersecurity and ...