top of page
All Posts


Living off the Land Attacks (LotL): When Hackers Use Your Tools Against You
SHILPI MONDAL| DATE: JANUARY 09 ,2026 We used to worry about "files." In the old days and by that, I mean just a few years ago defense was largely about spotting the anomaly on the disk. A strange .exe, a malicious payload, a signature that didn't match the known good. But the game has changed entirely. Why would an attacker spend time and money developing custom malware that might get flagged by your antivirus when they can simply use the tools you’ve already paid for, insta

Shilpi Mondal
2 days ago6 min read


Post-Quantum Cryptography: Is Your Data Ready for the “Harvest Now” Threat?
SHILPI MONDAL| DATE: JANUARY 08, 2026 The Quantum Clock is Ticking Louder Than You Think Imagine a burglar who can’t pick your safe today, so they simply steal the entire safe and wait for a better drill to be invented. This isn't a hypothetical scenario; it is the exact reality of the "Harvest Now, Decrypt Later" (HNDL) threat facing enterprise data right now. With recent breakthroughs pushing us closer to fault-tolerant quantum computing, the "theoretical" risk has official

Shilpi Mondal
3 days ago7 min read


The Underground Market for Zero-Day Exploits: Who’s Buying & Selling?
SWARNALI GHOSH | DATE: JANUARY 05, 2026 Introduction A potential zero-day exploit may be thought of as a master key used by a thief if the given software flaw were conceived as an unlocked door of a car. By the year 2026, that thief has several accomplices since he is a member of an industrialised locksmith factory that produces and delivers the master key all over the globe in just hours upon locating the lock. The stakes for the modern C-Suite have never been higher. We

Swarnali Ghosh
5 days ago5 min read


The Growing Threat of OAuth Token Abuse
SHILPI MONDAL| DATE: JANUARY 02 ,2026 Remember when a strong firewall and a complex password meant a good night's sleep? Those days are gone. We’ve seen a fundamental shift in how adversaries operate, moving away from banging on the digital front door of hardware perimeters to quietly subverting the very identity frameworks we rely on for "seamless" connectivity. At the heart of this shift is the OAuth 2.0 protocol. It’s the ubiquitous plumbing for our SaaS integrations, th

Shilpi Mondal
Jan 35 min read


Voice Cloning for Corporate Espionage: The New Frontier in BEC Threats
SHILPI MONDAL| DATE: DECEMBER 23, 2025 The scenario is no longer the plot of a spy thriller; it is a Monday morning reality for modern finance departments. A regional controller receives a call from the Group CFO. The cadence is perfect, the slight impatience in the tone is familiar, and the request an urgent, confidential wire transfer to secure a competitive acquisition is logically sound. Without hesitation, the controller bypasses standard protocol, believing they are act

Shilpi Mondal
Dec 24, 20256 min read


Zero Trust in the Era of Supply Chain Attacks: Real-World Implementation Challenges
SHILPI MONDAL| DATE: AUGUST 25,2025 In today’s tech-driven world, supply networks are made up of many linked companies, playing a key role in how most businesses run. Because everything's connected, cyber threats spread easier and faster. Hackers now go after weak spots in outside suppliers or apps - a move that’s getting more complex and common - putting vital systems at risk across the globe. To fight back, some use Zero Trust setups, which assume nothing is safe by default

Shilpi Mondal
Dec 17, 20255 min read


Security Challenges in the Tactile Internet - Ultra-low-latency networks and real-time haptic communication vulnerabilities
SHILPI MONDAL| DATE: NOVEMBER 12 ,2025 Picture controlling a surgery knife from miles away, sensing every bit of pushback through a smart glove. Or think about guiding a massive machine across the country like you’re right there, hands-on, feeling the grind of steel on steel. This is what the Tactile Internet could bring - sending touch, pressure, and movement back and forth almost instantly, fast enough for humans to react naturally, often said to be within just one millisec

Shilpi Mondal
Dec 15, 202510 min read


Psychological Profiling of Phish-Ready Users: Ethical Boundaries & Practical Use
SHILPI MONDAL| DATE: DECEMBER 09,2025 Phishing, deceptively crafted messages or communications that trick individuals into revealing sensitive data, remains one of the most persistent and effective forms of cyberattack. Phishing exploits not software vulnerabilities, but human psychology. In recent years, researchers have begun investigating an approach that goes beyond “phishing detection” alone: profiling individuals’ psychological traits to identify who might be more sus

Shilpi Mondal
Dec 15, 202510 min read


Designing Security-Friendly UX: Why Usability Wins in Reducing Workarounds
MINAKSHI DEBNATH | DATE: DECEMBER 11, 2025 People don’t want to be “bad actors.” People just wanna finish their tasks quickly, without hassle. If safety rules slow them down, folks tend to skip around them faster but risky shortcuts pop up. Build UX that works with security, not against it, cuts out those detours, slashes danger, helps teams move better and feel better too. Ahead: what’s really going wrong, real-world proof from studies and companies, stories from the field,

Minakshi DEBNATH
Dec 13, 20254 min read


Digital Inheritance and Posthumous Data Security: A Guide to Managing Your Cyber Legacy
SHIKSHA ROY | DATE: NOVEMBER 12, 2025 In today’s world, where daily life ties closely to online spaces, people carefully arrange who gets their home or old keepsakes. But most forget about something just as real - their digital presence. Whether it's private bank details, photos saved online, or profiles on social apps, this stuff doesn't vanish when we’re gone. Instead of ignoring it, more folks are starting to take steps ahead of time. This guide breaks down why handing of

Shiksha ROY
Dec 13, 20255 min read


Cyber Threats in Drone Delivery Networks: How Hackers Could Hijack Autonomous Logistics
SHILPI MONDAL| DATE: NOVEMBER 21,2025 From coffee and groceries to blood samples and critical medicines, drones are fast becoming the “last mile” workhorses of modern logistics. Companies from Amazon to Zipline, Wing, UPS Flight Forward and countless startups are betting that small autonomous aircraft will weave through cities and suburbs, dropping packages with near-zero human touch. But there’s a harsh truth buried under the sleek marketing videos: drone delivery networks

Shilpi Mondal
Dec 11, 202512 min read


The Role of AI in Detecting and Mitigating Insider Threats
SWARNALI GHOSH | DATE: DECEMBER 09, 2025 In times when hackers make news and companies stress about outside breaches, a sneakier threat slips through: people inside. These risks - done on purpose or by accident - use access we freely give staff, freelancers, or allies. Old-school digital defences, built to block outsiders, usually miss low-key or creeping dangers from within. That’s why smart systems are stepping in to help spot what others overlook. AI speeds things up, han

Swarnali Ghosh
Dec 11, 20255 min read


Cybersecurity Fatigue: When Security Measures Backfire – The Psychology of Alert Overload
MINAKSHI DEBNATH | DATE: NOVEMBER 20, 2025 In today’s online world, staying secure matters more than ever. Companies use many tools to guard info as attacks keep coming nonstop. But there's a side effect now people just get tired of it all. That mental drain hits when constant pop-ups, rules, and warnings pile up, making folks tune out or skip steps, which opens doors for hackers. Getting why people burn out helps build smarter safety habits that actually work. What Is Cybers

Minakshi DEBNATH
Dec 10, 20254 min read


When AI Agents Go Rogue: The Emerging Cybersecurity Risks of Autonomous Digital Workers
SHILPI MONDAL| DATE: DECEMBER 08,2025 AI’s hit a turning point - not because of chatbots or number-crunching tools, yet thanks to smart bots that handle complex jobs on their own. Instead of waiting for people, these systems run full processes solo, acting like online helpers plugged into apps and data. They don’t clock out - so work keeps moving overnight. On top of that, companies save cash while expanding tasks faster than any team made of humans ever could. Yet under all

Shilpi Mondal
Dec 9, 20256 min read


"Shadow AI” in Security Teams: The Hidden Risk of Unapproved LLM Tools in the SOC
SHILPI MONDAL| DATE: NOVEMBER 25,2025 What “Shadow AI” Actually Is Shadow AI is the use of AI tools ; especially generative AI and large language models (LLMs) without approval, monitoring, or governance from IT or security. Think of it as Shadow IT 2.0: Instead of unsanctioned SaaS, it’s unsanctioned AI copilots, browser extensions, and LLM chatbots. Instead of “rogue” CRMs, you now have “rogue” model endpoints quietly ingesting sensitive data. Recent research shows how de

Shilpi Mondal
Dec 3, 20259 min read


The Economics of Human Risk: Pricing Phishing Exposure for Executive Team
SHILPI MONDAL| DATE: DECEMBER 01,2025 Why Human Risk Deserves an Economic Model For years, cybersecurity has quietly acknowledged a brutal truth: people are involved in most breaches. Verizon’s Data Breach Investigations Report (DBIR) has repeatedly found that the human element errors, social engineering, misuse is implicated in the majority of incidents. In recent editions, phishing and related social engineering (like business email compromise, or BEC) remain among the top

Shilpi Mondal
Dec 3, 20257 min read


Cybersecurity Risks in Synthetic Media and AI-Generated Content
SWARNALI GHOSH | DATE: AUGUST 19, 2025 Introduction: When Seeing Isn’t Believing We are entering an era where the adage "seeing is believing" no longer holds weight. The explosion of synthetic media deepfake video, AI generated audio, and convincingly crafted text has blurred the lines between the real and the fabricated. While these technologies offer creative and communicative potential, they also harbour profound cybersecurity threats that can disrupt trust, institutions,

Swarnali Ghosh
Dec 2, 20255 min read


AI-Powered Cybersecurity for Small and Medium Enterprises (SMEs): Bridging the Resource Gap
JUKTA MAJUMDAR | DATE March 04, 2025 Introduction Small and Medium Enterprises (SMEs) are increasingly targeted by cybercriminals, yet they often lack the resources and expertise to implement robust cybersecurity measures. AI-powered cybersecurity solutions are emerging as a game-changer, bridging this resource gap and providing SMEs with advanced protection at an affordable cost. The Cybersecurity Challenge for SMEs SMEs face unique cybersecurity challenges: Limited Budg

Jukta MAJUMDAR
Nov 30, 20253 min read


The Critical Role of Cybersecurity in Electric Vehicle Charging Networks
SHILPI MONDAL| DATE: AUGUST 21,2025 Introduction The electric vehicle (EV) revolution is transforming global transportation, with over 5 million EVs already on American roads and billions of federal dollars accelerating charging infrastructure deployment. However, this rapid expansion brings unprecedented cybersecurity challenges. EV charging stations represent a unique convergence of energy infrastructure, transportation systems, and networked technologies—creating a compl

Shilpi Mondal
Nov 30, 20257 min read


Blockchain Beyond Cryptocurrency: Applications in Supply Chain and Security
MINAKSHI DEBNATH | DATE: December 18,2024 Blockchain technology, initially designed to support cryptocurrencies like Bitcoin, has proven to be a transformative innovation with applications far beyond digital currencies. Its decentralized, transparent, and immutable ledger system has gained significant traction in fields such as supply chain management and security. These industries are leveraging blockchain to address long tanding challenges, improve efficiency, and enhance t

Minakshi DEBNATH
Nov 29, 20253 min read
bottom of page
