Back

Research Material

Articles

Explore our comprehensive articles on wide range topics such as Software Airworthiness, Real-time safety critical applications, Happenings in India defence and aerospace segment, potential cyber threat for the embedded systems, and the latest developments in aerospace areas. We cover a range of topics to help you understand and implement this standard effectively. From certification processes to software safety, and compliance strategies to best practices, our articles provide valuable insights to ensure your projects meet regulatory requirements.

On demand Content

Cyber Security

Ransomware Attacks Targeting VMware ESXi Infrastructure Adopt New Pattern

[responsivevoice_button rate=”1″ pitch=”1.2″ volume=”0.8″ voice=”US English Female” buttontext=”Click Here to Listen”] Cybersecurity professionals at Sygnia have noted a notable change in the strategies used by ransomware groups that are aiming at virtualized environments, specifically VMware ESXi infrastructure, in relation to

Read More »
Cyber Security

Threat Actor Claiming Access to AWS, Azure, MongoDB & Github API Keys

[responsivevoice_button rate=”1″ pitch=”1.2″ volume=”0.8″ voice=”US English Female” buttontext=”Click Here to Listen”] A threat actor has claimed to have gained unauthorized access to API keys for major cloud service providers, including Amazon Web Services (AWS), Microsoft Azure, MongoDB, and GitHub. The announcement was

Read More »
Cyber Security

Rockwell Automation Warns Admin to Disconnect Devices From Internet

[responsivevoice_button rate=”1″ pitch=”1.2″ volume=”0.8″ voice=”US English Female” buttontext=”Click Here to Listen”] Rockwell Automation has sent an urgent message to all of its customers because of rising geopolitical issues and hostile cyber activity worldwide. The company is asking that any devices

Read More »
Cyber Security

Hackers Exploited GitHub and FileZilla to Deliver Banking Malware

[responsivevoice_button rate=”1″ pitch=”1.2″ volume=”0.8″ voice=”US English Female” buttontext=”Click Here to Listen”] The Insikt Group at Recorded Future has found a sophisticated cybercrime operation run by Russian-speaking threat actors from the Commonwealth of Independent States (CIS). This group of hackers has

Read More »
Cyber Security

CISA Reveals Guidance For Implementation of Encrypted DNS Protocols

[responsivevoice_button rate=”1″ pitch=”1.2″ volume=”0.8″ voice=”US English Female” buttontext=”Click Here to Listen”] “Encrypted DNS Implementation Guidance,” a detailed document from the Cybersecurity and Infrastructure Security Agency (CISA), tells government agencies how to improve their cybersecurity by using encrypted Domain Name System

Read More »
Cyber Security

Earth Hundun Hacker Group Employs Advanced Tactics to Evade Detection

[responsivevoice_button rate=”1″ pitch=”1.2″ volume=”0.8″ voice=”US English Female” buttontext=”Click Here to Listen”] Earth Hundun, a notable Asia-Pacific malware organization, uses Waterbear and Deuterbear. We first encountered Deuterbear in Earth Hundun’s arsenal in October 2022, signaling its implementation. This report describes the ultimate Remote

Read More »
Cyber Security

WaveStealer Malware Delivered Via Telegram & Discord Messaging Platforms

[responsivevoice_button rate=”1″ pitch=”1.2″ volume=”0.8″ voice=”US English Female” buttontext=”Click Here to Listen”] Cybersecurity experts have identified a new malware, dubbed WaveStealer, that is being actively distributed through popular messaging platforms Telegram and Discord. This sophisticated malware masquerading as video game installers poses a

Read More »