Headlines
  • After issuing warnings, Iranian forces turned back two tankers that were trying to pass through the Strait of Hormuz, citing the ongoing US maritime blockade as the reason.
  • Iran claimed that since the war with the US and Israel started on February 28, over 3,400 people had died.
  • On Saturday night, the Islamic Revolutionary Guard Corps (IRGC) of Iran threatened to strike any ship that approached the Strait of Hormuz.
  • India's Ministry of External Affairs called the Iranian ambassador to India to discuss the "serious incident" involving two Indian-flagged ships that were fired upon on Saturday in the Strait of Hormuz.
  • Iran said that it is examining fresh U.S. proposals that were communicated through Pakistan's mediators, but it has not yet responded.
  • Hezbollah leader Naim Qassem vowed on Saturday that his fighters would retaliate against Israeli attacks on Lebanon and stated that the current 10-day ceasefire with Israel cannot be one-sided.

Tag: Cyber Attack

April 3, 2026

Password Spraying Attack

In a type of brute-force cyber attack as “password spraying,” attackers try to get access to several accounts using a small number of frequently used passwords.

April 2, 2026

Domain Name Systems (DNS) Exfiltration

Domain Name Systems (DNS) exfiltration is a cyberattack tactic in which a attacker uses DNS requests to covertly send private information from a compromised system to an outside server.

April 1, 2026

Intrusion Detection System (IDS)

A network security tool called an intrusion detection system (IDS) was first developed to find vulnerability exploits against a target computer or application.

March 31, 2026

Website Defacement Attack

An attack known as “website defacement” happens when threat actors hack into a website and replace its content with their own messaging.These messages may contain offensive language, embarrassing content, or political or religious remarks.

March 30, 2026

Web Application Attacks

Malicious acts that target web applications by taking advantage of flaws in its implementation or design are known as web application attacks. Unauthorized access, data theft, and other negative outcomes are possible outcomes of these attacks.

March 27, 2026

DLP Softwares

A safety precaution known as Data Loss Prevention or DLP finds and helps in preventing the improper or dangerous exchange, transfer, or use of sensitive data. It can support businesses and organisations to monitor and secure important data.

March 26, 2026

Block Cipher

A symmetric cryptographic algorithm known as a block cipher uses a shared secret key to encrypt plaintext into ciphertext and decrypt ciphertext back into plaintext.

March 25, 2026

Whaling Attack

A whaling attack, also known as whaling phishing, is a targeted phishing attack that poses as a legitimate email and is directed at senior executives targetting them that would allow them to access passwords, other user data, or sensitive parts of the network.

March 23, 2026

Data Loss Prevention (DLP)

In order to help organizations and businesses monitor and safeguard sensitive information across on-premises systems, cloud-based locations, and endpoint devices, data loss prevention is a security solution that detects and helps in preventing malicious or inappropriate sharing, transfer, or use. 

March 20, 2026

Identity and Access Management (IAM)

A framework of procedures, technology, and regulations known as Identity and Access Management (IAM) allows businesses to manage digital identities and regulate user access to vital company data.

Top