logotype
  • Home
  • Our Services
  • About Us
    • Our Mission
    • Our Swags
  • Blog
  • Contact Us

    Our Contacts

    We are Here

    Carnival Infopark Phase I, Kakkanad, Infopark Campus, Kochi, Kerala - 682030

    Mail Us

    info@gladiusschild.com

    Phone Us

    +91 7736213337

    Flaticon-telegramFacebook-fTwitter

    Get in Touch

      Our dedicated team is ready to assist you. Please give us a call, drop us an email. *

    • FAQ
    +91 773 621 3337
    logotype
    • Home
    • Our Services
    • About Us
      • Our Mission
      • Our Swags
    • Blog
    • Contact Us

      Our Contacts

      We are Here

      Carnival Infopark Phase I, Kakkanad, Infopark Campus, Kochi, Kerala - 682030

      Mail Us

      info@gladiusschild.com

      Phone Us

      +91 7736213337

      Flaticon-telegramFacebook-fTwitter

      Get in Touch

        Our dedicated team is ready to assist you. Please give us a call, drop us an email. *

      • FAQ
      +91 7736213337
      • Home
      • Our Services
      • About Us
        • Our Mission
        • Our Swags
      • Blog
      • Contact Us

        Our Contacts

        We are Here

        Carnival Infopark Phase I, Kakkanad, Infopark Campus, Kochi, Kerala - 682030

        Mail Us

        info@gladiusschild.com

        Phone Us

        +91 7736213337

        Flaticon-telegramFacebook-fTwitter

        Get in Touch

          Our dedicated team is ready to assist you. Please give us a call, drop us an email. *

        • FAQ

        Gladius Schild

        • Home
        • Our Services
        • About Us
          • Our Mission
          • Our Swags
        • Blog
        • Contact Us

          Our Contacts

          We are Here

          Carnival Infopark Phase I, Kakkanad, Infopark Campus, Kochi, Kerala - 682030

          Mail Us

          info@gladiusschild.com

          Phone Us

          +91 7736213337

          Flaticon-telegramFacebook-fTwitter

          Get in Touch

            Our dedicated team is ready to assist you. Please give us a call, drop us an email. *

          • FAQ
          logotype
          Author: gladiusschildadmio
          HomeArticles Posted by gladiusschildadmio
          Uncategorized
          gladiusschildadmio

          The Byju’s Data Breach: Safeguarding Student Data in a Digital Age

          Introduction:In the interconnected world of education and technology, the recent data breach at Byju’s, an eminent Indian edtech company, has raised alarms about data security and privacy. This breach exposed sensitive student information, including loan details, due to a...
          READ MORE
          Uncategorized
          gladiusschildadmio

          How to Use MITRE ATT&CK to Improve Your Cybersecurity

          Introduction:The MITRE ATT&CK framework is a valuable resource for security professionals who are looking to improve their organization’s cybersecurity posture. The framework provides a comprehensive overview of the tactics, techniques, and procedures (TTPs) that are used...
          READ MORE
          Uncategorized
          gladiusschildadmio

          New Fileless Attack Uses Python to Deliver Cryptocurrency Miner to Cloud Workloads

          Introduction:In a new fileless attack called PyLoose, a cryptocurrency miner is delivered to cloud workloads. The attack, which was first detected in June 2023, is notable for its use of Python to load the miner directly into memory, bypassing traditional security controls.How the...
          READ MORE
          Uncategorized
          gladiusschildadmio

          Citrix ADC and Gateway Zero-Day Flaw Actively Exploited in the Wild

          Introduction:Citrix has released security updates to address a critical vulnerability in its NetScaler ADC and Gateway products that is being actively exploited in the wild. The vulnerability, tracked as CVE-2023-3519, allows an attacker to execute arbitrary code on affected devices...
          READ MORE
          Uncategorized
          gladiusschildadmio

          How to Manage Your Attack Surface in 2023

          Introduction:Your attack surface is the sum of all digital assets that are exposed to the internet. This includes your website, web applications, cloud services, and even IoT devices. If any of these assets are not properly secured, they could be exploited by attackers.In recent...
          READ MORE
          Uncategorized
          gladiusschildadmio

          DDoS Botnets Exploiting Zyxel Flaw to Launch Devastating Attacks

          Introduction:A critical flaw in Zyxel devices is being exploited by multiple DDoS botnets to gain remote control of vulnerable systems and launch devastating attacks. The flaw, tracked as CVE-2023-28771, is a command injection bug that could allow an unauthorized actor to execute...
          READ MORE
          Uncategorized
          gladiusschildadmio

          Banking Sector Targeted in Advanced Open-Source Software Supply Chain Attacks

          Introduction:Researchers have discovered what they believe are the first open-source software supply chain attacks targeted at the banking industry. The attacks, which were carried out by two different threat actors, involved the use of malicious code that was embedded in popular npm...
          READ MORE
          Uncategorized
          gladiusschildadmio

          How to Protect Patients and Their Privacy in Your SaaS Apps

          Introduction:Cyberattacks are a common occurrence in the healthcare industry.. Sensitive patient data, such as names, birth dates, social security numbers, and addresses, is often stored in SaaS applications. This data can be used for identity theft, tax fraud, and other crimes.There...
          READ MORE
          Uncategorized
          gladiusschildadmio

          Google Messages to Add Cross-Platform End-to-End Encryption with MLS Protocol

          Introduction:Google has announced that it plans to add support for Message Layer Security (MLS) to its Messages service for Android. MLS is a security protocol that allows for end-to-end encryption (E2EE) across different messaging platforms. This means that users of Google Messages...
          READ MORE
          Uncategorized
          gladiusschildadmio

          macOS Under Attack: How Mac Users Can Stay Safe

          Introduction:MacOS is a popular operating system for many users, but it’s not immune to attack. In recent years, there has been a growing number of threats to macOS, including malware, ransomware, and phishing attacks.What Are the Rising Threats to macOS?There are a number of...
          READ MORE
          • 1
          • 2
          • 3
          Flaticon-telegramFacebook-fTwitterFlaticon-instagram

          Quick Links

          Home

          G & S Swags

          Our Services

          Blog

          About Us

          Contact Us

          Contacts

          Carnival Infopark Phase I, Kakkanad, Infopark Campus, Kochi, Kerala – 682030

          info@gladiusschild.com

          Subscribe

            Copyright © 2023 Gladius & Schild. All Rights Reserved

            Privacy Policy

            Terms of Use