The National Cyber Security Incident Response Center CERT RO…
https://blog.cybureau.org/wp-content/uploads/2021/09/Ive-hacked-into-the-server-of-your-South-Pole-Research-Station.-Pay-me-off-or-I-will-sell-the-stations-data-to-another-country.-1-1.png10801920Bogdan Gotuhttps://www.cybureau.org/wp-content/uploads/2019/05/logo_red-01.pngBogdan Gotu2021-08-28 15:41:382021-09-09 11:45:17WhatsApp accounts hijacked by attackers through social engineering methods
https://blog.cybureau.org/wp-content/uploads/2021/08/Hackers.jpg445769Kiran Bhatthttps://www.cybureau.org/wp-content/uploads/2019/05/logo_red-01.pngKiran Bhatt2021-08-24 13:07:092021-08-26 09:19:59Cryptocurrency Frauds: What one should know
One of the most gorgeous countries in the world, Afghanistan.
In…
https://www.cybureau.org/wp-content/uploads/2019/05/logo_red-01.png00Aahir Dashttps://www.cybureau.org/wp-content/uploads/2019/05/logo_red-01.pngAahir Das2021-08-21 16:01:012021-08-21 16:01:06Internet: The Last Window of Freedom for Afghanistan
Security firm FireEye reported that a Chinese hacking group…
https://blog.cybureau.org/wp-content/uploads/2021/08/D5809CD3-1354-4BC1-8038-AB70027D3479.png6281200Daksh Sharmahttps://www.cybureau.org/wp-content/uploads/2019/05/logo_red-01.pngDaksh Sharma2021-08-21 15:59:012021-08-21 15:59:04Chinese hacking group poses as Iranian while conducting cyber espionage in Israel: US Firm
On Sunday, 15th August 2021, reports were claiming that Ashraf…
https://blog.cybureau.org/wp-content/uploads/2021/08/WhatsApp-Image-2021-08-18-at-2.30.22-AM-1.jpeg513770Priyadarshini Baruahhttps://www.cybureau.org/wp-content/uploads/2019/05/logo_red-01.pngPriyadarshini Baruah2021-08-18 21:19:572021-08-18 23:08:56Role of Social Media in Taliban’s Takeover of Afghanistan
The world is shocked by the horrifying scenes of Afghan people…
https://blog.cybureau.org/wp-content/uploads/2021/08/Social-Media.jpg333500Madhu Vanthihttps://www.cybureau.org/wp-content/uploads/2019/05/logo_red-01.pngMadhu Vanthi2021-08-17 18:07:472021-08-18 14:02:52Social media and Taliban: The dilemma and Double Standards
On July 30 Accenture found some of its systems to be infected…
https://blog.cybureau.org/wp-content/uploads/2021/08/Ransom.jpg345500Madhu Vanthihttps://www.cybureau.org/wp-content/uploads/2019/05/logo_red-01.pngMadhu Vanthi2021-08-16 18:50:262021-08-16 23:49:19Ransomware: Loss to Global Business and its Impact
Over the course of eleven days in May 2021, Hamas and Israel…
https://blog.cybureau.org/wp-content/uploads/2021/08/Capture-1.jpg486904Aahir Dashttps://www.cybureau.org/wp-content/uploads/2019/05/logo_red-01.pngAahir Das2021-08-14 21:03:012021-08-15 12:36:50Inflammation of Israeli-Palestinian Conflict via Social Media
The Nuclear Command, Control and Communication systems (C3)…
https://blog.cybureau.org/wp-content/uploads/2021/08/NW.jpg418500Madhu Vanthihttps://www.cybureau.org/wp-content/uploads/2019/05/logo_red-01.pngMadhu Vanthi2021-08-12 14:46:312021-08-12 18:15:51Threats Emanating from Cyberspace to Nuclear Command, Control and Communication Systems
The idea that there should be mandatory verification via some…
https://blog.cybureau.org/wp-content/uploads/2021/08/C13FAC48-F7DE-44CF-A28C-11DCDF3873CD.jpeg6751200Daksh Sharmahttps://www.cybureau.org/wp-content/uploads/2019/05/logo_red-01.pngDaksh Sharma2021-08-11 20:57:552021-08-11 22:03:47The pitfalls of ID verification on social media websites
The Covid-19 pandemic has shifted the focus of governments across…
https://blog.cybureau.org/wp-content/uploads/2021/08/Crypto-Image.jpg333500Madhu Vanthihttps://www.cybureau.org/wp-content/uploads/2019/05/logo_red-01.pngMadhu Vanthi2021-08-09 09:35:292021-08-10 08:41:38Increase in the Use of Crypto Currencies by Terrorists
A trilateral National Security Agency (NSA) meet identified…
https://blog.cybureau.org/wp-content/uploads/2021/08/WhatsApp-Image-2021-08-08-at-09.30.49.jpeg5761024Daksh Sharmahttps://www.cybureau.org/wp-content/uploads/2019/05/logo_red-01.pngDaksh Sharma2021-08-08 11:07:282021-08-08 11:07:31India, Sri Lanka and Maldives NSA meeting identifies Cybersecurity as a pillar of cooperation
Pegasus is a surveillance tool developed by Israel’s NSO group…
https://blog.cybureau.org/wp-content/uploads/2021/08/photo-1487058792275-0ad4aaf24ca7.jpg333500Madhu Vanthihttps://www.cybureau.org/wp-content/uploads/2019/05/logo_red-01.pngMadhu Vanthi2021-08-06 23:25:052021-08-07 00:15:10Indian Activists Call for Robust Privacy Law in the wake of Pegasus Surveillance Issue
India's premier cybersecurity agency, the Indian Computer Emergency…
https://blog.cybureau.org/wp-content/uploads/2021/08/WhatsApp-Image-2021-08-06-at-12.18.16.jpeg375620Daksh Sharmahttps://www.cybureau.org/wp-content/uploads/2019/05/logo_red-01.pngDaksh Sharma2021-08-06 19:03:002021-08-06 19:26:09Indian IT minister lays the road map for India’s cyber future as government Cybersecurity Agency flags rising cases of cyber attacks to over 700 firms
The war in Afghanistan has taken a different path for the past…
https://blog.cybureau.org/wp-content/uploads/2021/08/thumb2-flag-of-afghanistan-4k-stone-background-grunge-flag-asia.jpg444710Yasser Malikzadahttps://www.cybureau.org/wp-content/uploads/2019/05/logo_red-01.pngYasser Malikzada2021-08-04 17:53:282021-08-04 21:10:39The War in Afghanistan is more like a Cyberwar
CERT-RO The National Response Center for Cyber Security Incidents…
https://blog.cybureau.org/wp-content/uploads/2014/09/romania_grunge_flag_by_syndikata_np-d5l7zul.jpg506900Bianca Cristina Parvuhttps://www.cybureau.org/wp-content/uploads/2019/05/logo_red-01.pngBianca Cristina Parvu2017-11-29 21:17:562017-12-02 17:33:20Romania is vice-champion at the European Cyber Security
WhatsApp accounts hijacked by attackers through social engineering methods
Cryptocurrency Frauds: What one should know
Is Nigeria Ready For Cyberwar?
Internet: The Last Window of Freedom for Afghanistan
Chinese hacking group poses as Iranian while conducting cyber espionage in Israel: US Firm
Role of Social Media in Taliban’s Takeover of Afghanistan
Social media and Taliban: The dilemma and Double Standards
Ransomware: Loss to Global Business and its Impact
AI and Cybersecurity
Inflammation of Israeli-Palestinian Conflict via Social Media
Threats Emanating from Cyberspace to Nuclear Command, Control and Communication Systems
The pitfalls of ID verification on social media websites
Increase in the Use of Crypto Currencies by Terrorists
India, Sri Lanka and Maldives NSA meeting identifies Cybersecurity as a pillar of cooperation
Indian Activists Call for Robust Privacy Law in the wake of Pegasus Surveillance Issue
Indian IT minister lays the road map for India’s cyber future as government Cybersecurity Agency flags rising cases of cyber attacks to over 700 firms
The War in Afghanistan is more like a Cyberwar
Romania is vice-champion at the European Cyber Security