Blog

Displaying items by tag: VinodSenthil

In an urgent reminder of the ever-evolving cybersecurity threat landscape, Samsung has issued an emergency security update to address CVE-2025-4632, a critical zero-day vulnerability actively exploited in the wild. This isn't a routine patch—it’s a significant alert for enterprises, CISOs, and mobile users worldwide. Over 2 billion Samsung devices are potentially exposed, raising an immediate and critical question

Published in Others

Cybersecurity professionals have long warned that the biggest threats to enterprise security are not necessarily the most complex. Often, it's the unpatched, overlooked, or misunderstood vulnerabilities that open the door to devastating breaches. This truth was once again proven with the discovery of CVE-2025-32756, a critical zero-day vulnerability affecting Fortinet’s FortiOS, the backbone of its widely deployed firewall and networking solutions.

Published in Others

In today’s digital-first world, convenience often comes at the cost of privacy. Every click, voice command, and facial scan contributes to a growing ecosystem of personal data. While users place trust in technology providers to safeguard their digital identities, recent events reveal that this trust is not always upheld.

Published in Others

In the wake of the recent Pahalgam incidents, the focus has once again shifted to national security—and with it, the hidden battlefield of cyberspace. Though the core issue stems from the actions of terror outfits and not direct state-to-state aggression, the digital spillover is undeniable.

Published in Others

Imagine paying just €10 to knock an entire website offline.
No hacking knowledge required. No secret chatrooms. Just a simple, user-friendly web portal.
This wasn’t fiction—it was the reality of the growing DDoS-for-hire underworld.

Published in Others

In one of the most unexpected cybersecurity incidents in recent memory, the CEO of a cybersecurity company was charged with deploying malware on hospital systems. This shocking betrayal has shaken the industry to its core. How could someone entrusted with securing critical systems turn into the very threat they are supposed to defend against?

Published in Others

Open-source software has radically transformed how modern applications are built. It accelerates development, reduces costs, and fosters innovation. But in this era of rapid development and microservices, it also introduces a silent but significant threat: your dependencies. 

Published in Others

Did you know that over 80% of data breaches are tied to weak or stolen passwords? This single fact has fueled years of cybersecurity challenges—and now, Microsoft is taking bold action to address it. The tech giant recently announced a ground breaking move: all new Microsoft accounts will be passwordless by default, ushering in a new era of security powered by passkeys.

Published in Others

Imagine installing a plugin to protect your website—only to discover it’s the very reason your data has been compromised. That’s the disturbing reality facing more than 1,100 WordPress websites, all of which fell victim to a fake security plugin that promised protection while quietly enabling a full-scale breach.

Published in Others

The Karnataka High Court has recently taken a decisive step in the ongoing global debate over encrypted communication and digital freedom. In a directive issued under Section 69A of the Information Technology Act, the court ordered the Government of India to block access to Proton Mail—a Swiss-based encrypted email service known for its end-to-end security and zero-access architecture.

Published in Others
Page 2 of 2

Information

digiALERT is a rapidly growing new-age premium cyber security services firm. We are also the trusted cyber security partner for more than 500+ enterprises across the globe. We are headquartered in India, with offices in Santa Clara, Sacremento , Colombo , Kathmandu, etc. We firmly believe as a company, you focus on your core area, while we focus on our core area which is to take care of your cyber security needs.