LinkedIn linked to dark web

LinkedIn began in co-founder Reid Hoffman’s living room in 2002 and was officially launched on May 5, 2003. Today, LinkedIn leads a diversified business with revenues from membership subscriptions, advertising sales and recruitment solutions under the leadership of Ryan Roslansky. In December 2016, Microsoft completed its acquisition of LinkedIn, bringing together the world’s leading professional cloud and the […]

Yatra’s voyage to dark web

Yatra Online Pvt Ltd based in Gurgaon India, is one of India’s leading online travel companies and operates the website Yatra.com. The company provides information, pricing, availability, and booking facility for domestic and international air travel, domestic and international hotel bookings, holiday packages, buses, trains, in city activities, inter-city and point-to-point cabs, homestays and cruises. As […]

80K Credit Cards for sale on dark market!

Cyble’s researchers came across a data leak that involved detailed information of over 80,000 credit cards put up for sale on the darkweb market on May 28. This dump of credit cards consists of credit card details of various countries. According to their research team the split of credit cards as per the country is […]

Indian’s Truecaller records leaked!

The Swedish caller identity app, Truecaller, is popular among the Indian users. The app provides a set of features to smartphone users including call-blocking, flash-messaging, caller-identification, call-recording, and Chat & Voice services. Cybersecurity research firm Cyble reported that unknown hackers are selling personal information of 47.5 million Indian users of Truecaller, on May 26, a […]

Data breach at Unacademy

 Unacademy which is India’s largest education platform based in Bangalore is changing the way to learn. In a span of 6 months, over 300,000 students have benefited from over 2,400 online lessons and specialized courses on cracking various competitive examinations, on our platform. They have onboard some of the top educators in the country. They originally started […]

March

Off with February, onto March. 2020 was just getting started cause March was the month when the Coronavirus took its all on the world. With the first known case being reported in New York, the virus made it to the western world on 1st March. Italy became the worst hit country with death toll surpassing […]

OSI Model

We speak. Birds chirp. But how do applications communicate with each other over a network? To understand, OSI model is used by IT professionals. OSI stands for Open Systems Interconnection, that is used to observe how networks send and receive data on a network. The main concept of OSI is that the process of communication […]

February

The first day of February told us that January was just a filler or a trailer. The locusts swarm across East Africa in Somalia, putting the nation at emergency because of their recorded highest number in 25 years. The locusts then made their way to Sudan causing a food crisis in the African Nation. On […]

Amazon Web Services (AWS)

Today, we want to talk about an introduction to AWS, to its services. But to do that, I really want us to look at the question, what is cloud? What is AWS? There’s many definitions out there, but the one that we’re going to go with is the idea of an on-demand, pay-as-you-go, IT services that are delivered over the […]

ML FOR LAZIES

Yesterday I was wondering what was the point of toiling and going through with each and every algorithm when it was all available in on different platforms. But soon it made me realize , it had always been about working smart right ? I mean , isn’t it the only motive to introduce AI and […]

VAPT continued!

What is VAPT? Why is it needed? How it is done? Some of the details have already been discussed so far. If you have missed it, find it here! Penetration Testing have been learnt and now we shall go for Vulnerability Assessment. A vulnerability assessment is a process of finding out the vulnerabilities (mistakes or […]

VAPT

Development doesn’t happen suddenly. If it had happened so, it is not development. Any highest grossing companies, Google for example,V have their earlier and the later phases. Same as for the companies, Internet also has its earlier phase. During that phase not everything is well secured and equipped as today it is. Vulnerabilities existed all […]

Top 10 Cryptocurrencies

With each passing day, the interest in cryptocurrencies is on an upward trajectory. In the past 10 years, a long list of cryptocurrencies have been created. Some don’t last very long, but others end up influencing the future of the blockchain in a significant manner. The market cap of a cryptocurrency speaks volumes about its […]