February 2024

I-SOON – HACKERS FOR SALE!

DailyPost 2709 I-SOON – HACKERS FOR SALE! Every worthwhile which hits the international media speaks of the cyber modus operandi, nature of data stolen, which could be likely perpetrator – known ransomware gangs, whether some data is on display in the Dark Web, ransom, and what could likely nature of monetization and leaks. Might be […]

I-SOON – HACKERS FOR SALE! Read More »

PROJECT TAILWIND

DailyPost 2705 PROJECT TAILWIND At Google I/O, an annual developer conference, held in 2023, number of AI first experiments were made known to the world of which was Project Tailwind. It was a new kind of a notebook enabling people to learn and deliver faster. Tailwind at the end of productization was getting rolled out

PROJECT TAILWIND Read More »

CACTUS RANSOMWARE

DailyPost 2704 CACTUS RANSOMWARE It has often been said that getting hacked is the new normal. It has slowly gained the status of truism. Even the best of the truisms doesn’t have a real-life example so often and seemingly unending. These are times we live in. One also gets a feeling that ransomware is here

CACTUS RANSOMWARE Read More »

THE NEW BORDERS

DailyPost 2703 THE NEW BORDERS We all know what borders are from international borders to the city / town borders and that of states, districts and village panchayats. There would never be any difference of opinion on what those borders are, what purpose do they serve and what are the regulations required to cross any

THE NEW BORDERS Read More »

TOKENS – LLM’s CURRENCY

DailyPost 2702 TOKENS – LLM’s CURRENCY Multimodal Large Language Model has established itself as the tool for future Artificial Intelligence transformation of the world. It is unstoppable is accepted. It would rule the roost till some other super transformative tool hits the world may be in a decade or so and mostly built on the

TOKENS – LLM’s CURRENCY Read More »

MICROSOFT’s AZURE UNDER ATTACK

DailyPost 2701 MICROSOFT’s AZURE UNDER ATTACK Every cyberattack gives you a feeling it can’t get bigger, by whatever parameters you have in mind, but every single time that barrier is breached. The parameters can be nature of access, ransomware parameters, the brand of the business enterprise, geographical spread, not of computers / servers engaged, cloud

MICROSOFT’s AZURE UNDER ATTACK Read More »

LOCKBIT NEARER HOME

DailyPost 2700 LOCKBIT NEARER HOME If you don’t get any news of a major cyber attack for a week or so, be rest assured something has gone wrong. It might be that the incident/s have not been deliberately reported or may have been hushed up after payment of ransom. In all ransomware attacks the Catch22

LOCKBIT NEARER HOME Read More »

Scroll to Top