New KickAss Torrents (KAT) ~ Best Torrent Sites 2020 (Working)

Good news, the new Kickass Torrents site is back online. Back in July 2017, popular BitTorrent site Kickass Torrents (KAT cr) was taken down by the United States authorities after its owner Artem Vaulin was arrested. The peer-to-peer file sharing site became the world’s biggest piracy hub after The Pirate Bay went offline. Now shortly after law enforcement shut […]

British Hacker Accused of Blackmailing healthcare Firms Extradited to U.S.

A British man suspected to be a member of ‘The Dark Overlord,’ an infamous international hacking group, has finally been extradited to the United States after being held for over two years in the United Kingdom. Nathan Francis Wyatt, 39, appeared in federal court in St. Louis, Missouri, on Wednesday to face charges related to […]

How Organizations Can Defend Against Advanced Persistent Threats

Advanced persistent threats (APTs) have emerged to be legitimate concerns for all organizations. APTs are threat actors that breach networks and infrastructures and stealthily lurk within them over extended spans of time. They typically perform complex hacks that allow them to steal or destroy data and resources. According to Accenture, APTs have been organizing themselves into groups that […]

Now, malls mine customers data to offer better deals Read more at

NEW DELHI: Pacific Mall in West Delhi figured out through algorithms that 65% of the customers at its food-court preferred vegetarian food. That prompted the mall to add a Halidram outlet and sales at the food-court went up by Rs 50 lakh a month. In Bengaluru, Orion Mall found that most of its customers are […]

The 2020 State of Breach Protection Survey – Call for Participation

2010-2019 decade will be remembered as the time in which cybersecurity became acknowledged as a critical concern for all organizations. With rapidly growing security needs and respective budgets, it is now more essential than ever for security decision-makers to zoom out of the ‘products’ mindset and assess their security stack in light of the overall […]