Read More 1 minute read Blog Multiple Vulnerabilities in Google Chrome Description Use-after-free The vulnerability allows a remote attacker to compromise a vulnerable system. The vulnerability exists due to… December 29, 2021
Read More 2 minute read Blog Numerous spyware-infested apps found on Google Play Store The new spyware infects Android apps on Google Play after being downloaded to steal users’ SMS messages, contact… July 29, 2022
Read More 3 minute read Blog How to Avoid Becoming a Victim of the Next Global Cyber Attack? Is your business or startup safe and secure? It may or may not be. But do you know… May 20, 2021
Read More 3 minute read Blog What is Application Security? An application’s security is a moving target. With technology advancing with leaps and bounds, application development and deployment… September 3, 2021