<:head> version='1.0' encoding='UTF-8'?>https://www.technologyworld64.com/sitemap.xml?page=1https://www.technologyworld64.com/sitemap.xml?page=2https://www.technologyworld64.com/sitemap.xml?page=3 Tecnologyworld64.com,Rakkhra Blogs google-site-verification: googlead701a97b16edc97.html Govt's Parivahan website's source code, user data exposed on dark web

Govt's Parivahan website's source code, user data exposed on dark web

Govt's Parivahan website's source code, user data exposed on dark web
It is true that the source code and user data of the Parivahan website was exposed on the dark web. The breach was discovered by cybersecurity firm CloudSEK on August 2, 2023. The leaked data includes:
The source code of the Integrated Road Accident Database (iRAD) website, which is an initiative by the Ministry of Road Transport and Highways (MoRTH).
The personal data of iRAD users, including names, email addresses, mobile numbers, and passwords.
Sensitive information such as hostnames, database names, and passwords.
CloudSEK has notified the MoRTH about the breach and has urged them to take immediate action to secure the iRAD website and safeguard sensitive user data.
The exposure of this data is a serious security incident and could have a number of implications for iRAD users. For example, it could be used by criminals to impersonate users, commit identity theft, or launch phishing attacks. It is important for iRAD users to be aware of this breach and to take steps to protect themselves, such as:

Changing their passwords for the iRAD website and any other accounts that use the same password.
Being vigilant for phishing emails that may contain malicious links or attachments.
Monitoring their credit reports for any unauthorized activity.
If you are concerned that your personal information may have been exposed in this breach, you can use a service like CyberNews Leaked Password Check to see if your password has been found on the dark web. You can also contact the MoRTH for more information about the breach

Post a Comment

Previous Post Next Post
<!-- --> </body>