Mahadev Thukaram

Cybersecurity & IT GRC Expert

2 + 4 =

My blogs

New Bruteprint Attack Lets Attackers Recover Fingerprints from Images

A new attack called Bruteprint has been discovered that can be used to recover fingerprints from images. The attack works by exploiting the fact that fingerprints are often visible in images, even if they are not the main focus of the image. Bruteprint uses a machine...

Volt Typhoon: A Chinese State-Sponsored Cyber Threat Actor

How Volt Typhoon Works: Volt Typhoon is a Chinese state-sponsored cyber threat actor that has been active since at least 2012. The actor is known for using a variety of techniques to compromise networks, including spear phishing, watering hole attacks, and exploiting...

Understanding Data Leakage Prevention (DLP): Safeguarding Your Valuable Information

In today's digital age, organizations face increasing threats of data breaches and leaks. Protecting sensitive data is crucial to maintaining trust, regulatory compliance, and avoiding financial and reputational damage. Enter Data Leakage Prevention (DLP) – a vital...

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

See all blogs