Blog

In one of the most unexpected cybersecurity incidents in recent memory, the CEO of a cybersecurity company was charged with deploying malware on hospital systems. This shocking betrayal has shaken the industry to its core. How could someone entrusted with securing critical systems turn into the very threat they are supposed to defend against?

Open-source software has radically transformed how modern applications are built. It accelerates development, reduces costs, and fosters innovation. But in this era of rapid development and microservices, it also introduces a silent but significant threat: your dependencies. 

Did you know that over 80% of data breaches are tied to weak or stolen passwords? This single fact has fueled years of cybersecurity challenges—and now, Microsoft is taking bold action to address it. The tech giant recently announced a ground breaking move: all new Microsoft accounts will be passwordless by default, ushering in a new era of security powered by passkeys.

Imagine installing a plugin to protect your website—only to discover it’s the very reason your data has been compromised. That’s the disturbing reality facing more than 1,100 WordPress websites, all of which fell victim to a fake security plugin that promised protection while quietly enabling a full-scale breach.

Imagine installing a plugin to protect your website—only to discover it’s the very reason your data has been compromised. That’s the disturbing reality facing more than 1,100 WordPress websites, all of which fell victim to a fake security plugin that promised protection while quietly enabling a full-scale breach.

The Karnataka High Court has recently taken a decisive step in the ongoing global debate over encrypted communication and digital freedom. In a directive issued under Section 69A of the Information Technology Act, the court ordered the Government of India to block access to Proton Mail—a Swiss-based encrypted email service known for its end-to-end security and zero-access architecture.

Cybersecurity is a battle that never stops, and as new threats emerge, so must our defenses. Today, two critical vulnerabilities—CVE-2025-1976 (Broadcom Brocade) and CVE-2025-3928 (Commvault)—are actively exploited in the wild. These flaws, added recently to the U.S. Cybersecurity and Infrastructure Security Agency's (CISA) Known Exploited Vulnerabilities (KEV) catalog, put countless organizations at immediate risk. In this post, we break down these vulnerabilities, the potential risks they pose, and what you must do to stay protected.

In the past 90 days alone, security teams have detected a 217% surge in cloud-based attacks targeting educational institutions. The latest threat actor making headlines? Storm-1977 - and their sophisticated techniques are bypassing traditional security measures at an alarming rate.

digiALERT Signs with BlueScript AI as a Strategic Cybersecurity Partner
In an era where digital transformation is a necessity, ensuring that modernization is secure is just as critical as making it efficient. Recognizing this, digiALERT, a leading global cybersecurity services firm, has signed on as the Strategic Cybersecurity Partner for BlueScript AI, the frontrunner in AI-driven modernization platforms.

In the ever-evolving landscape of cyber threats, the North Korea-linked threat actor known as Kimsuky has once again demonstrated its capabilities and adaptability. Recently, Zscaler ThreatLabz identified Kimsuky using a new malicious Google Chrome extension....

Information

digiALERT is a rapidly growing new-age premium cyber security services firm. We are also the trusted cyber security partner for more than 500+ enterprises across the globe. We are headquartered in India, with offices in Santa Clara, Sacremento , Colombo , Kathmandu, etc. We firmly believe as a company, you focus on your core area, while we focus on our core area which is to take care of your cyber security needs.