Author: Prithesh Durai

NIST Cybersecurity Framework 2.0: A Comprehensive Guide to Enhanced Digital Defense

NIST Cybersecurity Framework 2.0: A Comprehensive Guide to Enhanced Digital Defense

In a groundbreaking development, the National Institute of Standards and Technology (NIST) recently unveiled version 2.0 of its renowned Cybersecurity Framework (CSF). This release, the first major update in a decade, reflects the dynamism of the digital landscape and the evolving threat landscape. Initially tailored for critical infrastructure organizations, the CSF 2.0 is now poised

Read More
Microsoft Azure’s Biggest Security Crisis: : Massive Data Breach Puts Executive Accounts at Risk

Microsoft Azure’s Biggest Security Crisis: : Massive Data Breach Puts Executive Accounts at Risk

In the ever-evolving landscape of cybersecurity threats, even tech giants like Microsoft are not impervious to the sophisticated tactics employed by threat actors. The recent cybersecurity incident that befell Microsoft marked not just a breach but a watershed moment in the company’s history. This extensive blog aims to unravel the intricacies of this incident, from

Read More
Be diligent while watching or skipping ads in between your favourite youtube videos

Be diligent while watching or skipping ads in between your favourite youtube videos

Introduction: In the intricate world of cybersecurity threats, a disturbing convergence has surfaced on YouTube, where seemingly innocent videos promoting cracked software harbor a malevolent secret – the distribution of Lumma Stealer. In this comprehensive exploration, we delve into the deceptive landscape of YouTube videos enticing users with promises of free premium software, uncovering the

Read More
Unveiling How Malware Defies Password Resets via Google MultiLogin Exploit

Unveiling How Malware Defies Password Resets via Google MultiLogin Exploit

In our earlier blog, we talked about how some people could misuse Google OAuth to take over someone’s session without permission. Surprisingly, this seemingly harmless part turned out to be a favorite for malware that steals information. CloudSEK found a serious problem where malware uses MultiLogin to keep control of a user’s session, even after

Read More