top of page
Rajesh Kanungo
Aug 21, 202423 min read
Securing an AI System - Tutorial - Part 1
Methods to defend against data poisoning attacks Saurabh Malpure (TalaSecure, Inc.) Rajesh Kanungo (TalaSecure, Inc.) Jaime Burks (UCSD)...
530
Rajesh Kanungo
Jul 22, 202411 min read
GenAI Security Challenges and Solutions
Rajesh Kanungo (CEO, TalaSecure, Inc.) Tejpal Chadha (CEO, MyAiDr.ai) Executive Summary Investment in Artificial Intelligence (AI) and...
260
Rajesh Kanungo
Jun 21, 20242 min read
512,000 Radiology patients' data stolen
Executive Summary Consulting Radiologists LTD. (“CRL”) reported that cybercriminals may have stolen the data of roughly 512,000 patients....
60
Rajesh Kanungo
Jun 18, 20242 min read
ARM Memory Security Broken
Executive Summary A team from South Korea, Juhee Kim, Youngjoo Lee, Jinbum Park, Taesoo Kim, Sihyeon Ro, Jaeyoung Chung, and Byoungyoung...
60
Rajesh Kanungo
Sep 17, 20224 min read
Risk Management, Data Loss Prevention and everything around it…
The first in a series of blog posts about how Security Risk and Data Loss Prevention are related.
70
Rajesh Kanungo
Mar 9, 20222 min read
Cryptocurrency: the US tries to legitimize it
The latest White House development in cryptocurrencies, Executive Order (EO)on Ensuring Responsible Development of Digital Assets, is...
20
Rajesh Kanungo
Feb 21, 20223 min read
Ransomware: how to estimate the Risk
Why is it so hard to estimate cybersecurity, especially ransomware risk? Why is it that ransomware attacks have an outsized impact on an...
20
Rajesh Kanungo
Feb 17, 20222 min read
Cracking the password of an Apple Mac with a T2 Security Chip
Macs with Intel processors and Apple T2 Security Chip can now be broken into using simple brute force methods. A company, Forensic...
510
Rajesh Kanungo
Feb 16, 20222 min read
Prevent Ransomware: its in your CI/CD pipeline
Wouldn't it be nice if you rarely had to roll back your newly deployed changes to the infrastructure due to security compliance (SOC2,...
20
Rajesh Kanungo
Feb 9, 20224 min read
It's difficult to hide a $4.5 BILLION dollar BTC heist (current value)
Ilya Lichtenstein and Heather Morgan, husband and wife, stole 119,754 Bitcoin (BTC) from a Hong Kong Bitcoin exchange, Bitfinex, worth,...
20
Rajesh Kanungo
Feb 7, 20221 min read
Ransomware that couldn't: some good news
The Target Swissport International Ltd. is an aviation services company providing airport ground, lounge hospitality, and cargo handling...
10
Rajesh Kanungo
Feb 7, 20221 min read
Digital Exchanges: How to fund your own missile program
I came across a very good article by Chainalysis: Here is a short summary and what you can do to become a target. North Korea siphoned...
10
Rajesh Kanungo
Feb 7, 20222 min read
320m Ether Heist due to exploit of a delayed signature check fix
Wormhole is a blockchain bridge used to transfer assets from one blockchain to another. For example, you can move assets between Solana...
10
Rajesh Kanungo
Feb 6, 20222 min read
Cyber-insurance underwriters and brokers are taking a beating
Cyber-insurance Underwriters and brokers are taking a beating due to flawed assessments and unanticipated losses after a sharp increase...
10
Rajesh Kanungo
Jan 30, 20221 min read
Mobile handset manufacturers insert spyware
Huawei, Xiaomi and OnePlus cellphones are sending extremely detailed personal information, app usage, system info back to their servers....
10
Rajesh Kanungo
Jan 30, 20221 min read
GriftHorse
GriftHorse: Zimperium zLabs recently discovered an aggressive mobile premium services campaign with upwards of 10 million victims...
10
Rajesh Kanungo
Jan 30, 20221 min read
Hackers use the Fear of the NSO group to install Malware
Hackers created Malware masquerading as a prophylactic for the NSO group's Pegasus software. They even posted it on a site looking like...
10
Rajesh Kanungo
Jan 30, 20221 min read
Scanning people vs computer systems
We do have a choice and may want to appeal to our respective governments to help them with their priorities. The UK Ministry of Defence...
30
Rajesh Kanungo
Jan 30, 20221 min read
Log4j steps
Updated December 16th, 2021 Short Log4j attack mitigation steps : 0. Update to the latest version of log4j version 2.17 or higher 1....
10
Rajesh Kanungo
Jan 30, 20221 min read
Log4j: Making your customers feel safe
How do you make your customers feel safe from the log4j vulnerability? (a) Say nothing (b) Disclose. I hate to pitch any company, other...
30
bottom of page