Handling QR Code Phishing Scams
While QR codes are a quick and efficient tool for marketers and consumers alike, the cyber risks they pose are [...]
Enhance Your Office 365 Email Security with Check Point Harmony
Microsoft 365 is the most widely used and targeted email service globally. With the rise in hacker sophistication, particularly AI-based [...]
Shift from Google Workspace to Zoho Workplace?
For any business to be able to thrive in today’s world, streamlining workflows and enhancing team productivity is essential. Zoho [...]
The Crucial Lesson of Data Backups: Protecting Your Business from Ex-Employee Sabotage
As recent events have shown, even the most robust systems can be vulnerable to internal threats, particularly from unhappy former [...]
The Evolution of Business Communication Compromise
Microsoft Teams has become a vital communication channel for many organizations. However, it's only recently that we've started to see [...]
Elevate Your Collaborative Experience with Zoho Workplace
Flexibility and seamless collaboration are vital to quality work and creative outputs. Finding the right digital workplace solution can make [...]
StrelaStealer Phishing Attacks: A Deep Dive into the Tactics and Techniques
A recent revelation by cybersecurity researchers sheds light on a new wave of phishing attacks targeting over 100 organizations across [...]
Enhancing Remote Work Efficiency with Zoho Workplace
In the wake of unprecedented challenges brought by the pandemic, businesses worldwide have undergone a transformative shift towards remote work. [...]
AutoDesk Drive Caught in Phishing Scams
A new wave of sophisticated phishing attacks has emerged, targeting unsuspecting individuals through compromised email accounts. According to a recent [...]
Enhancing Cybersecurity Awareness : The Power of Phishing Simulations
Phishing remains one of the most prevalent cybersecurity threats faced by organizations worldwide. As attackers become increasingly sophisticated, it's crucial [...]
Unlocking Better Email Security with DMARC Reports
In the realm of cybersecurity, email remains a primary target for malicious actors seeking unauthorized access or data compromise. To [...]
Understanding Backup, Recovery, and Disaster Preparedness
This guide aims to simplify and explore the concepts of backup, recovery, and disaster preparedness, shedding light on their significance [...]
Midnight Blizzard Strikes Microsoft
Microsoft recently experienced a serious cyberattack by a Russian-linked criminal group, Midnight Blizzard, also known as Nobelium. Experts are calling [...]
Understanding Gmail and Yahoo DMARC Requirements
In an effort to bolster email security, Google and Yahoo announced new requirements for bulk senders regarding Domain-based Message Authentication, [...]
4 Crore Whale Phishing Scam
As our digital world expands, so does the danger of cyber threats. Recently, thousands of people have fallen prey to [...]
Ransomware Strikes Hospitals, Disrupting Patient Care
Hospitals faced significant challenges this week as ransomware attacks disrupted crucial services, impacting patient care and medical operations. Despite assurances [...]
Uber Slapped with AUS$412,500 Fine in Australia for Violating Anti-Spam Laws
In a recent development, the Australian Communications and Media Authority (ACMA) has imposed a substantial fine of AUS$412,500 (equivalent to [...]
Ensuring a Safer and Spam-Free Email Experience: Gmail’s New Initiatives for 2024
In the two decades since Gmail revolutionized email communication, the landscape of online threats has evolved significantly. The latest announcement [...]
Cybersecurity 101: A Complete Guide on Online Privacy
In an age dominated by technology, the question of privacy is more pertinent than ever. "I have nothing to hide" [...]
Pune Faces Wave of Whale Phishing Scams: Cyber Criminals Targeting Top Executives
In a concerning trend, cybercriminals have been employing sophisticated tactics to defraud several Pune-based companies by impersonating their Chief Executive [...]
Mastering Endpoint Detection and Response (EDR): Your Shield Against Evolving Threats
With cyber threats constantly evolving, businesses need cutting-edge solutions to protect their data and operations. Endpoint Detection and Response (EDR) [...]
Shifting to SASE for Simplifying Security in a Cloud-Driven World
In the dynamic world of cyber security, a new term has emerged: SASE, pronounced as "sassy." SASE stands for Secure [...]
Embracing Zero Trust Network Access (ZTNA) for Enhanced Cybersecurity
In an era where cyber threats are becoming increasingly sophisticated, and remote work has become the norm, traditional network security [...]
Malicious Email Attachments Even from Bonafide IDs
In a concerning development, the government has issued a cybersecurity circular, cautioning officials about the potential risks associated with email [...]
Beware of Ongoing Phishing Campaign Targeting Zimbra Collaboration Servers
In recent months, an alarming cybersecurity threat has emerged, targeting Zimbra Collaboration email servers worldwide. This phishing campaign, which began [...]
New Phishing Campaign Delivers LokiBot Malware Through Microsoft Word Vulnerabilities
In a startling revelation, cybersecurity experts have uncovered a sophisticated phishing campaign that employs cunning tactics to drop the notorious [...]
Strengthening Email Security for PCI DSS Compliance: The Role of DMARC
PCI DSS (Payment Card Industry Data Security Standards) is a set of vital regulations that companies dealing with cardholder information [...]
Zero-Day in Salesforce Email Services
A recent spear-phishing campaign has brought to light the significance of staying vigilant against advanced hacking techniques. A leading cybersecurity [...]
The Rising Threat of ‘Phishing as a Service’ – How FraudGPT Exploits Generative AI
The power of Generative AI has given rise to both transformative advancements and unforeseen risks. One such risk has appeared [...]
Evolving Cyberattack Landscape
The cyberattack landscape is constantly evolving, with cybercriminals becoming more sophisticated in their methods. According to Acronis' biannual threat report, [...]
Ransomware Attack on AIIMS Triggers India’s National Cybersecurity Response Framework
In a significant move to bolster India's cybersecurity measures, the government has introduced the National Cybersecurity Response Framework (NCRF) following [...]
Enhancing Customer Engagement with BIMI: The Key to Building Trust and Recognition
Businesses strive to stand out in the crowded online marketplace and foster strong connections with their customers. Building and maintaining [...]
Exploring the Role of Firewall Technologies in Network Security
Understanding the need for firewall technologies In today's interconnected world, network security plays a vital role in safeguarding sensitive information [...]
How can IT and cybersecurity vendors enhance their email security & mailing offerings?
In today's dynamic business landscape, establishing a strong brand presence and harnessing the power of cutting-edge technology is crucial for [...]
SMTP Security and Authentication
In today's digitally interconnected world, email has become an indispensable means of communication for individuals and businesses alike. However, with [...]
Fortinet Ransomware Protection Survey
In today's interconnected digital landscape, organizations face a persistent and growing threat from ransomware attacks. These malicious attempts to encrypt [...]
Barracuda Zero-Day Exploit
In a shocking revelation, cybersecurity researchers have discovered that a zero-day vulnerability in Barracuda's security products has been actively exploited [...]
Benefits of DMARC for Email Domain Protection
In today's digital landscape, email has become an integral part of our personal and professional lives. However, the rise of [...]
Improving your cyber security strength
The percentage of companies globally ranked as mature in device security is 31%, while in data security, it is 22%. [...]
How Deepfake is risky
What is deep fake? Deepfake has gained wide accessibility and popularity. Deepfake refers to videos or any digital representations which [...]
How VolumeMail SMTP Can Improve Your Business Email Marketing Strategy
Email marketing is a powerful tool for businesses of all sizes, allowing them to reach customers directly and effectively. However, [...]
How to Improve Your Email Deliverability with BIMI
Email marketing is a crucial aspect of any business's strategy. However, with the rise of email threats and spam filters, [...]
Why Regular Web Security Assessments Are Critical for Your Business
Cyber security threats are becoming increasingly sophisticated, making it more challenging for businesses to protect themselves from attacks. As a [...]
4 Ways to Spot and Avoid Phishing Scams
Phishing scams are a widespread problem in today's digital age. Criminals use this method to obtain sensitive information from individuals [...]
Microsoft 365 for work efficiency
As the world continues to grapple with the effects of the COVID-19 pandemic, organizations around the globe have had to [...]
Secure SD-WAN
Wide area network i.e. WAN is a telecommunications network which spreads over a large geographic region. It helps facilitate communication [...]
Why Backup Microsoft 365: A Simple Guide
Microsoft 365 is important for storing sensitive data like emails and documents. But sometimes, things can go wrong, and your [...]
Tamper-Proof Your Microsoft 365 Data Protection with Acronis Cyber Protect
In the dynamic landscape of today's digital business world, Microsoft 365 has become the backbone of productivity for countless companies, [...]
SASE: The Network Security Game Changer for Businesses
SASE combines essential functions like web filtering, cloud app protection, and secure remote access into one unified platform. It simplifies [...]
Protection with Acronis Cyber Protect
In the dynamic landscape of today's digital business world, Microsoft 365 has become the backbone of productivity for countless companies, [...]
Phishing and Cyber Incidents in 2022
As 2023 slowly draws to a close, we reflect on the cyber incidents that began rising in 2022 and created [...]
Massive Aadhaar Data Breach Exposes Personal Information of 81 Crore Indians on Dark Web
In a significant cybersecurity incident, a report from US-based cybersecurity firm Resecurity reveals a massive data breach exposing the personal [...]
Targeting Zimbra Collaboration Servers
In recent months, an alarming cybersecurity threat has emerged, targeting Zimbra Collaboration servers worldwide. This phishing campaign, which began in [...]
Australia for Violating Anti-Spam Laws
In a recent development, the Australian Communications and Media Authority (ACMA) has imposed a substantial fine of AUS$412,500 (equivalent to [...]
Harnessing the Power of AI and ML for Robust Email Security
Email security remains a critical battleground. With over 90% of cyberattacks beginning with phishing campaigns, safeguarding your organization's sensitive data [...]
Benefits of Simulated Phishing Programs
In the ever-changing cybersecurity landscape, organizations struggle with the constant threat of cybercriminals exploiting vulnerabilities and compromising valuable information. To [...]
Specialized Email Gateways to Combat IP Blacklisting
In modern communication, email remains a critical tool for businesses and individuals to connect, collaborate, and communicate. However, for organizations [...]
Understanding and Preventing DNS Attacks for Better Network Security
Network security is a critical concern in today’s digital landscape. As organizations heavily rely on the internet and web-based services, […]
3 Ways Microsoft Teams Phone Boosts Workplace Productivity
Voice communication is a crucial element in business that plays a vital role in bridging the gap between customers and […]
Cyber Security for Financial Institutions
The scope of cyber security for financial institutions has expanded in recent years and will continue to become even more [...]
Mahesh Bank Cyber Incident – ₹65 Lakh Penalty for Lapses in Cybersecurity
The Mahesh Bank cyber incident was a shocking episode for banks across India. Mahesh Bank fell victim to a significant [...]
Additional security for Office 365
Do you need additional security for Office 365? When users deal with giants like Microsoft, they believe that security is [...]
The Role of DMARC In Combatting BEC Attacks
Living in today’s world, it is extremely likely you have been using business email for quite a while. It’s also [...]
ION Group Ransomware Attack
LockBit ransomware strikes again ION Group, a software company located in the UK faced a serious cyberattack on January 31, [...]
4 Effective Email Marketing Campaigns for Small Businesses
Email marketing campaigns have proved to be the most ROI-positive marketing tools for small businesses which are looking to increase [...]
Understanding Simulated Phishing Campaigns with 5 Easy Steps
Simulated phishing campaigns to combat social engineering Phishing simulation is your tool to prevent your employees from falling victim to [...]
Top 10 Open Source Software Threats
Software supply chains have been exploited more and more in the recent past due to lack of cyber security vulnerabilities. [...]
GPT responsible for new-age AI-assisted phishing attacks
Phishing attackers have been tricking users into divulging their credentials with phishing and misuse it to wreak havoc. But with [...]
4 Useful DMARC Monitor Services to Protect Email Domain
What is DMARC? Before we dive into how DMARC Monitor services can improve your email security, let us first understand [...]
The Logix Partnership Program
About Logix and its Partnerships with Domain Leaders Since 1999, Logix InfoSecurity is a prime Cloud Email Security and Mail [...]
Inbound VS Outbound Email
Outbound marketing generates 3 times fewer returns than inbound marketing. Having said this, marketers sometimes don’t have a clear idea [...]
Importance of security awareness training
Why is security awareness training important? What does security awareness training entail? Security awareness training is a powerful tool used [...]
3 essential data protection components in cyber security
While several things about cyber security revolve around managing the intangible aspects of your business such as employee awareness and [...]
ICC BEC Scam
ICC BEC Scam: Around $2.5 million vanished from the ICC Account The Indian Cricket Council fell prey to a massive [...]
Harmful ChatGPT phishing and BEC scams
The problem with GPT-3 and ChatGPT phishing scams GPT-3 is truly valuable AI that uses deep learning technology resulting in [...]
GoDaddy Compromised For The Last 3 Years – Terrorists Go Mad
GoDaddy has disclosed that a group of hackers had access to their network for approximately three years. The hackers were [...]
7 organizational habits for a security aware culture
Security awareness For establishing a security aware culture, cyber security needs to go beyond today’s technological advancements. It should include [...]
5 Security Trends You Must Follow in 2023 For Maximum Impact
It was quiet tough to follow the security trends, especially considering the rapid digitization of virtually all our personal and professional activities.
AIIMS Ransomware Attack – Havok at the Medical Institute
The All India Institute of Medical Sciences recently fell prey to a crippling ransomware incident, resulting in a complete server […]
Benefits of Instant Messaging for Small Businesses
In the past couple of years, we transitioned from onsite work to Work from Home and now we finally seem […]
Modern email scams are more personal and deadlier
When we hear news about this scam or that, we often wonder how someone else could’ve fallen for such an […]
Optimize your email security architecture to prevent phishing
Over the past several years, early-stage detection and response to email threats have saved multiple organizations from severe disruption. However, […]
Preventing Data Breaches – Best Practices for Businesses
If you are a business with an online presence – which in 2022 you most definitely are – then you […]
Strengthening the human element for better cybersecurity
Businesses tend to be a bit apprehensive about proper cybersecurity training for their employees because they feel it distracts them […]
Paying Ransomware Amounts
Ransomware is a nasty problem to have. With one mindless click or an unwitting file download, your entire organization faces […]
Microsoft Solutions for Hybrid Work
The recent past is an indicator that businesses undeniably need a digital setup to do their best, most professional work. […]
The Benefits of BIMI for Email Marketers
About BIMI (Brand Indicators for Message Identification) BIMI is an emerging email authentication protocol that allows your brand logo to […]
2022 Cloud Security Reports
Understanding cloud security insights Recent trends of remote working and off-site collaboration have pushed businesses to speed up their digital […]
Microsoft Advanced Solutions for Better, Faster, and More Secure Work
Over the course of 2022-23, Microsoft is all set to release a suite of solutions, especially considering the newly developing […]
The Importance of Digital Trust
Why digital trust – The changing trends of digital businesses The business world has now shifted its pivotal operations to […]
Understanding Transport Layer Security (TLS)
When it comes to email security, it is not enough to enforce protection at just the sender’s and receiver’s end. […]
What is a firewall?
A firewall is an essential part of any network security setup. It is a device – either hardware or software […]
SSL Certificates – 7 Best Practices You Must Follow
In an earlier blog on SSL Certificates we went over the reasons SSL certificates are important. It is a vital […]
4 Ways Microsoft Collaboration Tools Go the Extra Mile
A business can only succeed when its resources work together cohesively towards a common objective. Rock-solid teamwork and dependability are […]
Your Guide to Choosing a Network Firewall
Firewall options and deployments are very flexible. They can be configured as per your objectives and requirements. The challenge comes […]
Oil India HQ Gets Ransom Demand of Rs 60 Crore
The registered headquarters of Oil India Limited (OIL) at Duliajan in Assam is caught up in a messy cyber threat. […]
Securing hybrid IT environments
When cloud technologies had first emerged, several businesses had jumped on the bandwagon. Now, the cloud has matured tremendously, and […]
Microsoft Shuts Down Exchange Online Basic Authentication Services
As cyber-attacks continue targeting remote workers and hybrid environments, Microsoft is taking active efforts to edify Exchange Online customers about […]
Deprecation of Microsoft Basic Authentication for Exchange Online
Until recently, the industry has relied on basic authentication as a security mechanism to connect to remote and local servers, […]
Celebrating Safety this National Cybersecurity Awareness Month (NCSAM 2022)
Every year, October is observed as National Cybersecurity Awareness Month. During this month, organizations strive to raise awareness about safeguarding […]
How Zimbra Collaboration Tool Revamped During the Pivotal Pandemic Stage
The Covid-19 pandemic seems to be receding in impact but back when it started, it threatened to disrupt business operations. […]
How Digital Transformation has become a necessity for businesses
Over the past couple of years, businesses have absolutely had to evolve digitally. Reinventing a business with a digital transformation […]
Choosing the right email server software
Since every business today hinges on emailing, choosing the right email server software will take you a long way in […]
Introducing Bharat Param Sneh Seva Sansthan (BPSSS)
The Bharat Param Sneh Seva Sansthan (BPSSS) is an admirable organization working passionately to lend a hand to those who […]
A Concise Guide on Email Security
Email has become omnipresent. No matter which industry your business belongs to, we are willing to bet you use email […]
A CrimsonRAT Among Indian Officials
Threat actors belonging to the notorious Transparent Tribe group have launched another cyber attack campaign, this time targeting Indian officials. […]
Cybersecurity Projections for the Rest of 2022 [And beyond]
Unfortunately, us cybersecurity professionals do not need magical powers to look into the future when it comes to cyber incidents. […]
Improve Network Agility with Zero Trust
Major factors in maximizing network agility today include the use of software-based structure, the flexibility to be dictated by user […]
US Infrastructure Attacked by AvosLocker Ransomware
Higher up authorities in the United States of America, including the FBI and the Treasury Department have recently issued a […]
Microsoft Security Now Enhanced with New Multicloud Capabilities
Microsoft is often known for its dependability and comprehensive solutioning. However, customers seldom realize Microsoft’s versatility and agility. When the […]
The 4 Challenges of Data Protection – With Pro Tips
Today, along with monetary transactions, every business also conducts data transactions. These are in terms of acquiring customers, chasing leads, […]
Zimbra – Google Workspace Coexistence Solution
What was the impetus for the Cloud Zimbra – Google Coexistence Solution? G Suite Free Edition is counting down the […]
Expeditors Ransomware Attacks Put Company in Trouble
Expeditors, an American logistics and freight transport company based out Washington, USA, faces total disruption at the hands of severe […]
Save Mailbox Space with Single Instance Storage of Cloud Zimbra
Save mailbox space? It’s possible that the thought hasn’t even crossed your mind. But with tons of emails being fired […]
Puma Data Breach – Effects of Kronos Ransomware Attacks
The Kronos Private Cloud (KPC), which caters to several companies, recently fell victim to a ransomware threat. Following the Kronos […]
Data Privacy Needs Intensify – Corporate Instagram Account Hijacking
Data has become as equally profitable for hackers as money. They can use their ownership of the data to exploit […]
Email Security Best Practices for Small Businesses
In a previous blog, we discussed why professional email is a necessity even if you’re a small business owner. While […]
Why Professional Email for Small Businesses Is a Necessity
Mailing goes with business operations like hand and glove. Today, sending and receiving emails is visceral part of day-to-day business […]
Password Strength Can Tighten Your Cybersecurity
Following the best cyber safety practices in your organization can go a long way in improving your cybersecurity posture. People […]
Ikea Email Server Attacks
Ikea, popular furnishing company, faces the heat of cybercrime as Ikea email servers get hit by phishing attacks. The Ikea […]
Proofpoint Phishing Attack Harvests Email Logins
In a recent Proofpoint phishing attack, email logins for Microsoft and Google for several hundred employees were stolen. The cybersecurity [...]
Secure Microsoft 365 Email with Cisco Cloud Mailbox Defense
In this blog, we are going over ways you can improve your cloud email security. In particular, we will discuss […]
Ukraine faces cyber trouble – Ukrainian bank and State websites hit
Global situations with respect to Ukraine are dire. But along with geopolitical issues, Ukraine is also being hit by wave […]
Corporate email server breach – activities of Squirrelwaffle
An email server breach at Microsoft’s Exchange servers was detected by a security firm. A threat actor has infiltrated Microsoft […]
A phishing attack through spoofed Amazon orders
This phishing attack takes brand impersonation to the next level. Not only has it baited victims with spoofed Amazon orders, […]
Statistics to prepare you for cybersecurity in 2022
Everyone was just waiting for the calendar to turn on 31st December 2021, because we needed the fresh start that […]
The biggest internet scams – and how to stop them
Phishing is a popular internet scam that has been claiming victims by the millions every year. It is often a […]
New Emotet campaigns disrupting mailboxes
The Emotet malware seems to be back from its 10-month vacation. Mid November, new Emotet campaigns were discovered, along with […]
Official FBI email servers hacked
An unidentified hacker group managed to get official FBI email servers hacked, on November 13th. With this illicit access, the […]
KYC registration agency gets vulnerability alert
An independent team of security researchers have identified a vulnerability in the software used by a Sebi-registered KYC Registration Agency. […]
Cyber incident highlights of 2021
Preparing for a secure 2022 We walk down memory lane today to inspect the most noteworthy cyber incidents of the […]
India’s biggest demat depository breached
Central Depository Services Ltd. (CDSL), a security firm liaised with the Bombay Stock exchange (BSE), National Stock Exchange (NSE) allegedly […]
Omicron phishing attacks already started
Back when Covid-19 had started spreading around the March of 2020, we had already expressed our disgust at how cybercriminals […]
TodayZoo phishing kit creates the Franken-phish phishing monster
A bizarre phishing campaign is afoot, using a tool called as a phishing kit to steal passwords. What’s so strange […]
SBI customers lose money to a novel bank phishing attack
Several customers of the State Bank of India have started filing complaints of losing their account money. The incident, which […]
Do your best work with Microsoft 365 Solutions
Microsoft 365 is here to provide the best integrate experience for your productivity and collaboration. Bring out your best in […]
Russian threat group after 14,000 Gmail accounts
A Russian-linked hacker group, APT28, purported to have been on a month-long phishing rampage, targeting Gmail accounts. According to Google, […]
The 7 worst data breaches of 2021
Because every business is now online, it generates plenty more data than it used to previously. Naturally, it needs to […]
Ransomware trends in 2021
Ransomware attacks have been on a steady rise in 2021, both in number of ransomware attacks and also ransom amounts. There are trend shifts also in […]
Ransomware attacks rise by 64%
Between August 2020 and July 2021, there has been a 64% increase in ransomware attacks. Cybersecurity researchers analysed 121 ransomware […]
GoDaddy data breach – data of 1.2 million customers at risk
A popular web hosting provider and domain registrar, GoDaddy, recently fell prey to a serious data breach which led to […]
Indian organizations face rise in cyber security attacks
Several organizations in India, belonging to an eclectic group of industry sectors have recorded an increase in cyber security attacks. […]
Bank data breach costs RS 29 crore
The renowned SVC bank has registered a cyber case of criminal breach of trust and data compromise against its own […]
Azure network security – reduce cost and risk
With the surge towards cloud computing, more and more organizations are shifting their applications and computing to the cloud. This […]
5 security benefits of Next Gen Firewalls (NGFW)
An NGFW is a staple part of any security fabric today because it’s built to protect cloud data and network […]
US DoT impersonation leads to massive 2-day phishing scam
As we continue arming ourselves and helping companies arm themselves against modernized cyber threats, cases like these make us realize […]
Become a part of NCSAM 2021
Being #CyberResponsible With NCSAM 2021 Every year, October is celebrated as National Cyber Security Awareness Month (NCSAM). This year more […]
How Cisco endpoint security offers enhanced protection
With the introduction to cloud technologies and remote collaboration, there was a pressing need to move away from traditional antivirus […]
4 data protection tools for your small business
Any business today generates heaps of data, a majority of which is confidential. No matter the size and scale of […]
Benefits of Zoom for small businesses
Zoom offers the most features for remote collaboration, at the most feasible prices. The best thing about Zoom is its […]
Microsoft 365 Security in the Cloud
Along with dependable protection, Microsoft 365 Security solutions now bring a much-needed component to your security arsenal: integration. Microsoft 365 […]
Accenture in the crosshairs of Lockbit ransomware attack
A well-known consulting firm, Accenture, has fallen prey to a ransomware attack by the infamous Lockbit group. The Lockbit ransomware […]
Cisco Secure Email cloud mailbox – simplified email security for small businesses
When it comes to email security, small businesses especially have to follow the ‘Do It Right the First Time’ mantra. […]
Email archives VS email backups
Hassles of email management The volume of email data a business generates is humongous. This can cause problems of storage […]
Blocking bots – The role of an Advanced WAF
These days, we don’t go online. We are online. All the time. Especially with a majority of the population working […]
Microsoft Teams Essentials – bringing progress closer to you
Collaboration is the demand of today and is an essential part of business growth and productivity. Today, team members are […]
5 business benefits of Cloud-to-Cloud Backup
Barracuda recently undertook a global IT survey to address the changing needs of remote collaboration, cloud computing, cloud data security, […]
The State of Office365 Backup – Barracuda’s Cloud to Cloud Backup
Research in recent cybersecurity and IT trends has demonstrates that the shift to remote work and offsite collaboration has intensified […]
Fortify your security with Microsoft Security Solutions
Microsoft Security Solutions are here to provide greater security but at a lower cost. With these solutions, you get the […]
Widespread Ransomware 2.0 attacks
Last year saw a hike in not just the number of ransomware cases, but also in the variations of a […]
Government domains breached – official government data at risk
Government officials are under threat of a phishing campaign as ids of official government domains such as @nic.in and @gov.in […]
India faces 213 weekly ransomware attacks
Following the 2020 email hacking riot, 2021 did not let us off easy. More and more emails are being targeted […]
Remote Access Trojan – Your Passwords at Risk
A new variant of an old trojan has now been activated, putting passwords and Windows PCs at risk. The Remote […]
Security Threats in Banking and How to Handle Them
Security threats in banking are becoming much more dangerous. Especially considering how varied and deceptive they have become. Food for […]
Reasons India Needs Better Cybersecurity in Banking
Banking in India is a very structured and regulated. Banks realize they’re dealing directly with citizens’ hard-earned money and take […]
Effective Endpoint Security
Endpoint security is a tricky subject, especially considering all the many devices that communicate within and outside a network. Add […]
Adaptive Cloud Security & Why You Need It
Cloud computing brought with it an “always on” world. You can work from anywhere, access your data from anywhere, collaborate […]
Office365 Phishing Scam
When your go-to productivity applications start getting caught up in phishing scams, it makes you take a step back and […]
Microsoft Email Users Fall Prey to FedEx Phishing Emails
Microsoft email users seem to be repeatedly be targeted by one phishing scam after another. One curious observation is that […]
Celsius Data Breach – Phishing Claims More Victims
Celsius, a crypto lending service, recently learned of a security break at one of their third-party service providers, leading to […]
Ransomware Attack At Realty Firm– Possible Data Loss
A realty firm called Ansal Housing recently fell prey to a ransomware attack, which resulted in possible data loss. The […]
Banking Customers Fall Prey to Phishing Scams
Sensitive banking information is always a matter of great anxiety for us and a matter of great opportunity for hackers. […]
Exchange Email Hack
The Rampage Continues Vulnerabilities in a major player’s server architecture is an open invitation to hackers; once a group successfully […]
Growing Concerns of Credential Theft Cases
Deep research into cyber security threat patterns has revealed some trends in hackers’ behaviour that are worth noting. Studies show […]
What is an SSL Certificate and why is it important?
Why worry about an SSL Certificate? There are a lot of little things that come together to give your online […]
EU Banking Regulator Victimized by Microsoft Email Hack
Major Financial Institution Compromised The European Banking Authority, one of the foremost European financial regulators, recently declared it had fallen […]
4 New Hacker Groups Target Microsoft Email Servers
After the focused attacks on Microsoft email servers by alleged state-sponsored hacking groups (known popularly as the Hafnium group), other […]
Microsoft Exchange Server Flaws Affect 30,000 Companies
A slow-burn cyber breach has been transpiring since January, only recently coming to public attention. Due to Microsoft Exchange server […]
Hackers Target Government Officials Through Rogue Email ID
Several officials in the government were targeted for phishing through a rogue email ID. These government officials were spread out […]
Getting a bonus is always good… unless it’s an advanced Bazar Trojan in disguise
Security researchers have found a deadly variant of a Bazar Trojan that grabs control of your machine and cedes it […]
Hosting Provider Phishing Scam
Cyber criminals will often use scare tactics to prod their victims into interacting with their phishing links and malicious programs. […]
What is Cloud Security & Why Do You Need A Cloud Firewall?
The advent of cloud computing gave rise to hyper connectivity and constant availability. Data could not only be stored on […]
SitePoint Security Breach
SitePoint is an online portal which provides some great tutorials on web development. It recently went through a security breach […]
Office365 Email Compromise – SolarWinds Faces Security Breach
SolarWinds, an IT services company, recently faced issue with their email security. Sudhakar Ramakrishna, CEO SolarWinds, suspects a zero-day vulnerability […]
Server Hack Costs 1.5 Crore in Losses
Case Specifics A private company based in Pune recently suffered from a server hack. The hackers, who remain as of […]
Malwarebytes Hacked by The Same Group Behind SolarWinds Security Breach
Cyber security firm themselves are lucrative targets for hackers. It is a matter of pride for them; their way of […]
Common Cyber Attacks You Should Know
It is true that most common cyber attacks leverage gaps in technical devices or technological aspects a business uses, to […]
Haryana Hackers Steal INR 1 Crore
Haryana hackers defrauded ISGEC Heavy Engineering company and nicked an amount of INR 1.05 crore. These hackers intruded upon ISGEC’s […]
Microsoft Fails to Block O365 Email Spoofing Attacks
Microsoft is under the gun again for cyber fraud. 200 million+ users are at a risk of O365 email spoofing […]
What are the types of Network Security Devices?
In a previous blog, we explored various concepts associated with network security. If you haven’t already, we highly recommend reading […]
Understanding Network Security
Communication to and from devices essentially happens via networks. That network can be private (within an organization) or public (via […]
Features of Cisco Email ATP
Cisco provides one of the strongest email security solutions available today. In our blog on Cisco IronPort offering, we discussed […]
Your Guide To Prevent Phishing – Know How Hackers Think
Cyber criminals are getting creative with their ways and organizations have to lookout for new ways to prevent phishing attacks. […]
Pune-based Engineering Company Duped Out Of 50 lakhs
It’s cyber fraud cases like these that remind us of the gravity of cyber security. A Pune-based engineering company, with […]
Why you shouldn’t ignore email security in 2021
We can all agree this year has been a roller coaster ride. Almost everyone has had to adapt to some […]
Looking to migrate Zimbra to Office 365? There’s a better alternative to upgrade: Zimbra + Office 365 Hybrid
Zimbra is one of the leading email collaboration solutions in the market. It is a robust, flexible and affordable mailing […]
Prevent Social Engineering Attacks
This is the final part in our on-going series on social engineering. In this blog, we give you methods to […]
5 Social Engineering Attacks You Should Know
This is Part Two of our 3-part series on Social Engineering. In this blog, we discuss 5 social engineering attacks you […]
What Is Social Engineering?
When it comes to cyber-attacks, our thoughts jump immediately to malicious code and the misuse of technology. However, the success […]
Your Office 365 Credentials Are Vulnerable To This MS Teams Phishing Attack
It is time you should probably review the safety of your Office 365 credentials. Recently, Microsoft Teams was targeted for […]
This Pharma Lab Data Breach Caused Multiple Plants to Shut Down
A successful data breach at Dr Reddy’s, a well-known pharmaceutical company, caused a total shutdown of multiple laboratories and plants. […]
These two companies are favourites for spoofed emails
A quarterly report for cyber statistics has stated that two companies in particular have become go-to targets for spoofed emails. […]
Business Email Compromise: A Complete Guide
Email has become an inseparable part of any business. Sending invoices, making major decisions, updating your clients, scheduling meetings… all […]
Why Web Application Firewall Is a Must In Your Security Arsenal
If your organization is cyber aware, you doubtless have procured some services and tools for your network security. As more […]
Credentials Theft: A Case Study
Cyber criminals keep creatively upping their game and this new phishing attack is proof of that. A new worm phishing […]
Major Data Breach of Government Computers
The National Informatics Center (NIC) and the Ministy of Electronics & Information Technology (MeitY) suffered a data breach in early […]
Look out for Covid-19 Related Cyber Scams
While regulations have lifted the restrictions of strict lockdowns, common sense and the growing number of Covid-19 cases suggest otherwise. […]
Email Invoice Fraud Prevention – A Concise Guide
Business owners are now growing increasingly aware of cyber security concerns hanging over their heads like a dark cloud. That […]
Logix is a Microsoft Gold Partner in India
What are our offerings as a Microsoft Gold Partner? For some time now, the corporate sector has been all about […]
Nykaa Email Spoofing Case
Nykaa Loses 62Lakh To Cyber Fraud Most of the times, it is the individual shoppers and customers who are at […]
4 Ways Fraud Invoices Can Affect Your Business
Why Worry About Fraud Invoices? Fraud Invoices could victimize any business. Invoice fraud is a type of attack in which […]
4 Factors To Consider When Choosing Between Email Archival And Deletion
Is Email Archival Better than Email Deletion? Every business relies on email correspondence to some level. But as the volume […]
Logix Infosecurity : Microsoft office 365 partner in Kolkata
If you are looking for Microsoft office 365 partner in Kolkata, your search ends here with us at Logix Infosecurity […]
If I have an Anti-Virus, Do I need a firewall?
Well, Antivirus and Firewalls are both designed to keep your system safe but these two are fundamentally different and complementary […]
Save Disk Space and Improve Performance with Zimbra 8.8 HSM Technology
With Zimbra 8.8 HSM technology you can easily compress items and save precious disk space. This option can be easily […]
The Value of Mass Email Marketing Tools
What is the value of Mass Email Marketing? If you’re a business owner, one of your constant ambition is doubtless […]
Fraudster impersonated a prominent bank’s email domain to commit fraud
Bank’s Email Domains Impersonated to Commit Fraud Against Prothious Engineering Services An Engineering Service company called Prothious Engineering Services, became […]
The Threat Of Business Email Compromise
Business Email Compromise Becomes the Most Common Cyber Attack Webinars are part of the ‘New Normal’ which has settled everywhere, […]
Tax Accounting Software Spoofed
Tax Accounting Software Misused for Phishing Scam, CEOs Under Threat A multi-national cyber organization has uncovered a large-scale cyber-attack, which […]
9 Email Threats You Should Prevent
Why worry about Email Security? Email is the entry point for a maximum number of cyber threats. An email attack […]
The Free Covid Testing Phishing Scam
A Major Phishing Campaign Is Coming Your Way, Promising Free Covid Testing As the government dips its toes into opening […]
GSuite – Cloud Zimbra Hybrid Solution
Logix’s G Suite – Cloud Zimbra Hybrid Solution Any business needs mail servers to streamline their electronic communication. A powerful, […]
Mumbai Firm Loses 1.6CR to a Dodgy Invoice
Dodgy Invoices On The Rise Yet another case of a dodgy invoice causing massive monetary losses has come to light. […]
The Fake HR Email Phishing Scam
Work from Home may have become tiresome; but don’t let your guard down just yet India embarks upon a new […]
The Aramco-ONGC Fake Invoice Case
Fake Invoices: The New Monster Indian Companies Have to Face? As we launched our new service, Email Auto Protect, we […]
This New Phishing Scam Contains A Password Protected File
The Password Protected File: Added Security or Phishing Attack? A new phishing campaign has been active and it is a […]
Logix Launches A Unique Service to Fight Against Invoice Fraud
Secure Your Billing Process From Invoice Fraud Invoice Fraud is a type of cyber attack which is fast gaining notoriety, […]
The Phone Provider Phishing Scam – What is it and how to prevent it?
Don’t Trust Those Emails from Your Phone Providers In this age of ransomware and Emotet botnets, old-fashioned spear phishing attempts […]
Office 365 and Cloud Zimbra | Hybrid Mail Solution
Logix’s Hybrid Collaboration Solution: The Power of Two Giants at Your Disposal Collaboration is the buzzword of today’s world. Remote […]
Cyber Attack Cases Rocket During The Pandemic
Cyber Attack Cases Grow at A Worrisome Rate During the Pandemic The fight against the COVID-19 pandemic has been very […]
This Email Extortion Campaign Is Demanding Fake Ransom
Phishers resort to perverted email extortion Internet users beware. There is a new phishing campaign that is making the rounds […]
10 Steps For Ransomware Protection
It is uncanny, the resemblance of a ransomware’s working to the ongoing lockdown. Just like we are connected and yet […]
Cyber Cell Recovers Rs 65 Lakhs Lost To Invoice Fraud
Cyber Cell Recovers 65 lakhs Lost To Invoice Fraud With all the negativity in the news, it is cheering to […]
Delhi Police Imitated For Phishing Campaigns
The Enforcer Becomes the Victim It is a mark of shameful arrogance when cyber criminals pose as none other than […]
Fake Invoices: How is the Emotet Botnet Attacking Financial Sectors?
The Emotet Botnet Continues Its Rampage By Spreading Fake Invoices This is the second blog this week centred around the […]
Ransomware Strains In the News Again
Talos Incident Response Talks About New Ransomware Strains In a previous blog, we talked about how ransomware can be the […]
Operation TA542
Operation TA542: Emotet Resurfaces This botnet has been ping-ponging back and forth, claiming victims in large numbers and then vanishing. […]
Newsletter from Reserve Bank Information Technology Private Limited (ReBIT) on Cybersecurity
An article shared by Mr. Nandkumar Saravade, CEO, ReBIT in Cyber Pulse Newsletter brings up the development in the cybersecurity […]
You’ve Won An Award: Is It Really Just Good News In That Celebratory Email?
Congratulations! You have won … a free phishing scam! Everybody loves to get recognition for their work. Even better if […]
Tree Sena: An Unfortunate Cybercrime Case That Affected A Noble Cause
Tree Sena: A Sad Case of Identity Theft The scenario revolving around Aarey Colony and the metro is going through […]
Watch Out! Public Health Group Officials Being Imitated For Phishing Campaigns
Public Health Group Officials Imitated for Sending Out Phishing Emails We have already covered Coronavirus Phishing Ruses in a previous […]
Corporate Email Eavesdropping: Is Someone Spying On You?
A Mysterious Hacker Group Has Been Spying on Corporate Email and FTP Traffic We have discussed in an earlier blog […]
The Google Calendar Spam: Something you need to know?
Google Calendar Falls Prey to Spammers A rather unique spamming technique has been making headlines. Spammers are now gmail users […]
Multi-Factor Authentication: The Devil Is In The Details
Hackers attacked more than a million Microsoft Accounts ! If you need any more affirmation that your organisational security is […]
Coronavirus Sparks A Series of Phishing Ruses
Curb your instincts; don’t open emails just because they claim to contain news about the Coronavirus pandemic. We have already […]
Coronavirus Forces Employees to Work From Home. But What About Remote Security?
Covid-19 Outbreak forcing you to work from home? Here are the best security practices you MUST follow for maximum security. […]
Microsoft Office 365 and Google G Suite Become Hot Targets for BEC
FBI Reports Suggest BEC should be treated as seriously as Ransomware For businesses, the resource that needs to be protected […]
COVID-19 Sparks A Series of Phishing Attacks
Cybercriminals exploit the mass epidemic of COVID-19 Times are tough all over the world. The wide outspread of the Coronavirus […]
Fortinet Product Launch
Fortinet Launches A New Line of Firewall, and its Features are Super Impressive Fortinet has always been a forerunner in […]
Ransomware Delivers A Gut Punch To A Texas School District
Ransomware: The most damaging malware? The exact magnitude of a malware attack is difficult to estimate. It depends on what […]
Conversation Hijacking – The Latest Sneaky Phishing Technique
All About Conversation Hijacking One of the biggest yet age-old perils of technology is the theft of user data and […]
Using Artificial Intelligence To Battle Email Phishing
Artificial Intelligence: A possible way to go when it comes to Email Phishing The purpose with which email was so […]
Cyber Attacks Take A Toll On Business
Cyber Attacks become the most feared threat to businesses If you are a business owner, you already know starting a […]
The Disturbing Cybercrime Statistics in India
Cybercrime Statistic Reports Paint A Worrisome Picture Cybercrime statistics for 2019 have been publicised, and the statistics are definitely not […]
Subject Lines Used For Phishing Bait
Subject Lines That Are Most Frequently Used as Bait We have been advocating email security very eagerly since we work […]
The TrickBot Trojan Resurfaces
TrickBot Trojan Steals Data from the Windows Active Directory The TrickBot Trojan, a banking malware that earlier targeted the Windows […]
Preventive Techniques Against Spear Phishing
5 Tips to Avoid Spear Phishing An energy company in Ukraine called Burisma recently became the unfortunate victim of a […]
DeathRansom Evolves Into A Threatening Situation
DeathRansom – A New Strain of Ransomware Causes an Outrage A malignant strain of ransomware called as DeathRansom is causing […]
Machine Learning Scam Targets Google Search Results
Google Algorithms Targeted for Manipulating Search Results The world wide web has adjusted its working to a lot of fancy […]
Chandigarh Lawyer Tricked Out of ₹3.6 Lakhs
Fraudulent Email Causes Massive Loss Of Money It’s incidences like these that make us double our efforts and provide our […]
Young Techie Creates An Android App That Can Spoof Emails
Dangers of the Email Spoofer App App-savvy people beware. A new app is on the market that can launch a […]
Popular Scams Perpetrated Through Security Breach
The Biggest ‘Cyber Heists’ of the Century Although we wish for the internet to be a safe place for our […]
Data Protection Law Ushers in a Positive Change
An update on the data protection law December brought in some good news as a hopeful end to 2019. With […]
Fake Greta Thunberg Email Spreads A Dangerous Malware
Fake Greta Thunberg Emails Used to Ensnare New Victims Stories of brave individuals fighting for the overall betterment of our […]
DNS Protection
Protect Your DNS – How & Why? DNS or Domain Naming System is a computer server which accommodates public IP […]
Ransomware Causes 300 People To Lose Their Jobs
Ransomware Forces An Organization To Let Go Of 300 Employees Ransomware has been known to cause a lot of monetary […]
Emotet botnet malware hidden within fake Christmas party invites
Beware: Your Christmas party emails could be infected with malware Nobody likes downers when it comes to the holiday spirit. […]
Microsoft Report on Cleverest Phishing Tactics
Microsoft Reports on the Cleverest Phishing Tactics of 2019 While for individuals it is frustrating — and threatening — how […]
Best Practices For Online Security
Security Practices for Your Business — How many can you check off your list? When it comes to online security, […]
Ukraine Targeted by a Russian APT Hacker Team
Russian APT Hacker Team Strikes Out The Military and the Government are under the gun once again. The country of […]
Defence Ministry Targeted For Phishing
Warning Issued for Defence Personnel The defence ministry has issued an emergency warning to all defence personnel not to open […]
Most Likely Phishing Targets
Organizations Most at Risk of Phishing Phishing is a rapidly damaging cybercrime that has targeted a wide variety of domains […]
Corporate Email Hijacking
Corporate Email Hijacking: Know how it’s done Businesses contribute heavily to the email traffic flowing across the internet. Corporate email […]
Protection Against Online Scams
Guidelines to protect yourself against cyber-scamming Digitisation has seeped into virtually all aspects of our interactions, from virtual copies of […]
Cybercriminals target Windows 10 Update through Fake Emails
Ransomware targets Windows 10 Update TrustWave SpiderLabs security researchers have uncovered a malware that is bound to claim lots of […]
Beware – A Phishing Attack through IT Refund Message
Smishing, a variant of phishing, attacks through SMS usually target individuals or organizations, it imitates an identity of a legal […]
Fake voicemail notifications targetting credentials
Fake voicemail notifications aid scammers to collect Office 365 login credentials Heard of phishing attacks? There’s been an update! They […]
Phishing goes beyond email
While phishing expands its horizons, should your security? Expanding its customer base is one of the key strategies that a […]
The Dangers of Identity Theft
Identity Theft – what and how to stay safe? With cloud storages and online platforms growing stronger by the day, […]
Third Party VPN services under threat of attack by the infamous APT5 Team
VPN Compromised — Are you Safe? State sponsored hacking has been around for ages. It occurs when a nation’s government […]
Checkpoint Security reports a shocking rise in Sextortion Emails
There’re no lines cybercriminals won’t cross. Now they’ve resorted to sextortion! Malware was always a poisoned bit of coding A […]
FakeNarrator Malware launches an all-out attack in the South-East Asian region
Beware of FakeNarrator Malware Accessibility and Productivity play a key role in ensuring smooth functioning of any organization. Any service […]
NCSAM – Where Industries and the Government team up to raise Cybersecurity Awareness
It’s National Cybersecurity Awareness Month NCSAM is an internationally acclaimed awareness drive celebrated to promote the growing importance of cybersecurity […]
The ABCs of Malware – An informative Blog Series (Part 3 of 3)
All About Malware – Safeguarding Against Malware This is Part Three of the Three Part Series of Malware Blogs. Till […]
The ABCs of Malware – An informative Blog Series (Part 2 of 3)
All About Malware – Types of Malware This is Part Two of the Three Part Series of Malware Blogs. A short recap of […]
The ABCs of Malware – An informative Blog Series (Part 1 of 3)
All About Malware – Introduction & Working This is Part One of the Three Part Series of Malware Blogs. Malware […]
Amazon Prime Phishing Scam – Don’t fall for the “Account Frozen” Act!
Don’t Panic Online Shoppers, Amazon Prime is NOT Locked If you’re an Amazon Prime Member, you might have received an […]
Vloggers Under The Threat Of Phishing
Vloggers- the latest victims of phishing attacks Phishing attacks are not only getting more sophisticated but they are also expanding […]
The two branches of Phishing: Vishing and Smishing
Phishing gets two new neighbours, and they are just as deadly Phishing, which is the theft of information through fraudulent […]
Malware In Fake Income Tax Emails
Beware of Malware – It could be hiding in imposter income tax return emails! The internet has enabled individuals and […]
Machine Learning: A Protection Against Spear Phishing
How Machine Learning can help to protect your inbox from Spear Phishing Email is the easiest medium for malicious attackers […]
Rise in Phishing Attacks
Cyber Criminals Are Circling the Phishing Pond Cyber security surveys suggest that phishing is the most common type of online […]
Formjacking Attack And How T Protect Yourself From It
Are you under an invisible attack? “Who would be interested in stealing data from someone like me?” he said and […]
Imperva Hacked
Imperva Hacked: API Keys, SSL Certificates Stolen Based in California, USA, Imperva offers Cybersecurity software and services designed to protect […]
MS Word Trojan Malware out to steal your information
Alert: This Trojan Malware aimed at stealing bank details and personal information is spreading via infected Word documents. Which Malware? […]
Cyber-security is the linchpin for your business
Cyber Security in the era of Internet-of-things is a changing paradigm. According to recent study by Gartner, more than half […]
Microsoft TSO Host Tussle
An Overview A Web Hosting Service typically provides technologies and supplies at cost which enables your website to go live, […]
Ransomware: An insidious, evolving Threat
Ransomware is considered one of the most dangerous threats to organizations across the world. Malware authors are developing new malicious codes […]
Microsoft warns Users of phishing attacks using custom 404 Pages
Microsoft Security researchers discovered an unusual phishing campaign replicating their Microsoft login page designed to look exactly like Microsoft’s official login […]
India’s IoT Deployments suffered 22% more cyberattacks in Q2
IoT deployments in India received the maximum number of attacks from a few geographies in Central Europe. These attacks were […]
Whale Phishing has risen to be a major cyber security threat
A whale phishing attack is a specific type of phishing attack that targets high-profile employees, such as the CEO or CFO, in […]
Top 3 cybersecurity threats of 2019
Cybersecurity has risen ever higher up the corporate agenda for the very good reason that incidents and breaches result in […]
Coping up with evolving priorities and challenges of CISOs
With the increasing cybersecurity attacks the role of CISOs have evolved drastically from their roles 20 years ago. CISOs have […]
FlawedAmmyy RAT Malware Attacks even patched windows Users, Beware!
Always be cautious while opening email attachments. Recently, hackers have been sending weaponized Excels containing malicious malware FlawedAmmyy RAT, reported by […]
Visa Contactless cards are prone to big frauds
Hackers have found new ways to bypass the payment limits on Visa contactless cards. The attacks could steal unlimited sums from accounts, […]
Make your employees your Strongest link in Cyber Security
Your company may be using the latest software, hardware and other resources to protect against cyber security threats but unless […]
American Express customers targeted by Novel Phishing Attack
American Express customers were targeted with a Novel Phishing attack for stealing customer credentials. The scammers targeted both corporate and […]
Why SMBs are at higher risk of cyber attacks?
Due to the lack of a dedicated cyber security staff for detecting and responding to cyber attacks, SMBs are particularly […]
80% of companies lack DMARC policies against spoofing!
DMARC is a technology advancement in preventing email and domain spoofing. Inspite of being industry standard, 80 % of companies […]
Agent Smith Virus infected 1.5 crore devices in India
Do you see an ad popping up when opening Whatsapp? Then you are a victim of Agent Smith Malware.A newly […]
Top 5 tips to stay safe from phishing scammers
Email Spoofing and Email phishing attacks are more rampant than ever. Phishing Emails flow right into your Mailbox all around […]
Hardly 50 % of Fortune 500 companies practice email security using DMARC
In a recent survey conducted by Agari, it was discovered that just half of the Fortune 500 have deployed DMARC — or […]
Increasing cyber attacks calls for increased security audits within IT companies
Indian IT companies did not give high priority to cyber security but the increased number of cyber attacks have lead […]
RBI declares localisation of Payment Data Storage
The Reserve Bank of India (RBI) on Wednesday declared that all data related to payments must be stored in India […]
Analyzing World’s Top Cybersecurity breaches of 2019, so far
How safe is your organization? Data breaches are happening more often than ever exposing all the highly sensitive personal information. […]
Whatsapp to take legal Action against App Misusers and Spammers
Whatsapp has announced that it will take legal action against individual and companies sending bulk messages in violation to its […]
Increasing Abused Emails – How bad is it for your company’s brand repute
On an average 75 % of the bulk emails reach the Inbox of the intended recipient, according to an Email […]
Defending the New Generation phishing attacks
Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal […]
Are we still lagging behind the attack vendors? Stack Overflow and Canva attacked by hackers!
Last month, 2 major data breaches took place showing how companies are lagging behind in fulfilling the attack vectors. Its […]
Andheri Advertisement firm looses 12 lakh INR to cyber criminals
An advertising company in Andheri was cheated of Rs.12 Lakh in a ‘man-in-the-middle’ attack. A man-in-the-middle attack allows a malicious actor […]
Office 365 users combat targeted phishing attacks better with Cisco’s Email Security
Microsoft Office 365 has become the most widely used e-mail service in the market. Being the most popular and most […]
India ranks second in cyber attacks with 38 attacks per second
India is a country with the second-largest number of account take-over logins – close to 1.38 lakh login’s per hour […]
Top 7 tips to prevent Email Phishing and Email Spoofing Attacks
Email Spoofing and Email phishing attacks are more rampant than ever. Phishing Emails flow right into your Mailbox all around […]
Ransomware hits Telangana and AP’s power utilities
The websites of Telangana State Southern Power Distribution Company Ltd (TSSPDCL) and its AP counterpart encountered a ransomware attack a […]
Dark Web Exposes Computer-Server Data Transfer to Hackers
As startling as it may sound but cybercriminals now have access to the most-secured data files used to facilitate confidential […]
IMAP is the most exploited protocol. Office 365 and G Suite cloud accounts hacked
One thing leads to another like a domino, with access to leaked credentials dumps, the speed and efficiency of brute-force […]
Why should government entities adopt DMARC? And help get rid of suspicious emails!
If you think confirmation of name of the sender of the mail is enough to assure its genuineness, think again! […]
Logix SupportDesk Android App- Providing 24 x 7 support to all our customers
We believe in serving our customers without any delay. In order to provide complete and unhindered support to our 2200+ […]
In the Tax Filing Season, beware of phishing attacks
Beware of email phishing attacks from hackers while filing your Income Tax Returns. In email phishing attacks, hackers smartly replace […]
Ryuk ransomware Attack on Jackson county fetches hackers a whopping $400,000
The entire computer system of Jackson County, Georgia was hit by a massive Ryuk ransomware attack on March 01. Authorities […]
Beware of Income Tax Returns Email Phishing Hack
Beware of email phishing attacks from hackers while filing your Income Tax Returns. In email phishing attacks, hackers smartly replace […]
Beware of the increasing bank phishing frauds
All the banks are regularly advising their customers daily for being aware of the increasing phishing frauds by cyber criminals. […]
Spear phishing is on the rise in 2019
One of the most dangerous and highly successful type of cyber attacks is spear phishing attacks. This is a highly […]
Latest cryptomining malwares uninstalls cloud security software
This is a new bread of malware! A very new malware is seen accomplishing never before seen function – uninstalling […]
The power of design in the startup ecosystem
The reason many tech companies fail is not a bad product/market fit, the wrong technological approach or lack of experienced […]
Web applications: new back-doors to access private data
Multiple rogue web applications can be used to attack vulnerable browser extension and exploiting private data becomes easier for adversaries […]
Important cybersecurity statistics for 2019
Digital economy is growing everywhere in the world. Technology is changing our livelihoods in unprecedented ways. We cannot imagine life […]
4 things you must know about Cyber Security in the era of IoT
Cyber Security in the era of Internet-of-things is a changing paradigm. According to recent study by Gartner, more than half […]
Chinese hackers swindles Rs. 130 crore from an Indian arm of an Italian company
A Chinese hackers team stole 18.3 million dollars (Rs. 130 Crore) from the Indian arm of Italian company Tecnimont SpA by […]
Aadhar Card Data Leak calls for better cyber security!
Aadhar Card data of 130 million as well as bank account details have been leaked. A study published by Centre for […]
5 cybersecurity question every CIO must ask in 2019
There has been a far greater responsibility on the Chief Information Officers(CIOs) to understand the challenges, solutions and trade-offs in […]
Widespread Apple ID Phishing Attack Pretends to be App Store Receipts
This is big, the Apple-ID which managed to stay away from compromises is under attack. A notorious phishing campaign is […]
Are the e-commerce sites cyber-safe?
Can there be someone else in your shopping cart? Well, the scenario does sound scary but it might very well […]
Economic Impact of DMARC for companies across the globe
What is DMARC? DMARC is a security standard which allows a domain to declare a policy of how it wants […]
Concerns of SMBs on DMARC
DMARC (domain-based message authentication, reporting and conformance) has been gaining traction over the past couple of years. Organisation familiarising themselves […]
Half of the Phishing sites trick users by displaying the green padlock!
Phishing has always been hackers favorite act. It allows them to make multiple rewards after they succeed. Not only it […]
Business e-mail compromise (BEC), the new service which has takers!
For as low as $150 you can get the credentials for an email account. Hackers in some advert claim the […]
Increasing Phishing attacks in India
Phishing is on the rise in the country. India is among the top 4 countries in the world for Phishing […]
Latest DNS Spoofing attacks use fragmented datagrams. Can you avoid it?
With a little attention, as it turns out, one can spoof fake DNS responses using fragmented datagrams. How is it […]
Prevent the Fileless Attacks for your Windows PC
What is a Fileless or non-malware attack A non-malware attack is one in which an attacker uses existing software, allowed […]
India witnessed over 4.36 lakh cyberattacks in the first half of 2018
India ranks 21st in the global tally with 6,95,396 attacks hackers across various countries. However, India took the 13th spot […]
Ransomware Action Plan for Indian Businesses
Sometime in May last year the world woke up to the menace Ransomware can cause. Corporations were caught unaware of […]
Penetration Test vs Vulnerability Assessment. Choose wisely, stay protected.
It is definitely surprising that most people take penetration testing for vulnerability testing and vice-versa, sometimes even forego one for […]
10 warning Signs of malware on your system
There are innumerable amounts of malwares lurking around the internet. Do you think one single anti-virus can protect you from […]
2 million network storage devices affected by unpatched zero-day vulnerabilities!
Network storage devices (NAS), are critical for small and medium businesses as it adds to the extra storage space when […]
Facebook’s massive Data breach: what you need to know
The worries for facebook do not seem to stop with cambridge analytica and this time around it’s a massive data […]
Smart Strategies for an end-to-end network security
Network is the lifeline of any operating business. Almost 99% of the work is done using machines, connected in some […]
India Inc desperately needs to upgrade its cyber security- know why?
There has been a massive push from the government to digitize the payment, use Aadhar number with more transaction, job […]
How can you save your business from being the next hacker’s destination with VA?
Periodic Vulnerability assessment can be a strong step in the entire effort to keep business away from cyber-attacks. It can […]
New Phishing Attack , old trick. Steals Login And Payment Data
Phishing is old hacking trick, but is still very lucrative and works wonders if it succeeds. This time around the […]
Protect your Domain reputation with DMARC
Today the world is highly connected. People recognize brands more so than ever before. In our highly connected world, domains […]
5 common Cybersecurity mistakes that can put you in jeopardy
Cyberattacks, data breaches are amongst the most pressing problems CISO face across the companies (small, medium or large) around the […]
How much is “enough budget” for cybersecurity?
As the year comes to an end, now is the time to start preparing for budgets and fighting for departmental […]
5 biggest threats for CTOs in 2018
Nations run on digital infrastructure. Fire-sale, from the Die-Hard movie reminds of the possibilities of terrorist or well-funded criminal attack […]
How will AI change cybersecurity by 2023?
Codes are evolving, so are malware. Attacks have become more fluid, more sophisticated as they start with little unnoticeable things […]
Hospitality Sector Under the threat of AdvisorsBot malware
A new malware downloader, AdvisorsBot, has been spotted affecting hospitality sector via email campaigns. It is being hosted by a […]
World’s largest companies have adopted to DMARCs reject policy
Large companies across the world receive phishing emails every day. There are a number of these companies who are still […]
Cyber security basics are must for all. Be it Sales, HR or Engineer!
All the departments of the organization have access to different kinds of sensitive data. It is their responsibility to protect […]
Cyber criminals siphoned Rs 94 crore off a co-operative bank in Pune
Cyber criminals stole over Rs 94 crore from a Pune headquartered Cosmos Bank. The money was allegedly transferred to accounts […]
Mitre ATT&CK Framework: A boon to your company’s Red Team
The MITRE ATT&CK Framework has become increasingly popular over the last few years. It was originally developed to support Mitre’s […]
CFOs need to work closely with CIOs to stay Cyber Secure
2017 was an eventful year with high profile data breaches and notable cyber criminal activities. 2018 doesn’t look any comforting […]
Are your website images secured?
Malware can enter your machine through corrupted images on any website. Malware is stored in Exchangeable Image File Format (EXIF) […]
Why you must switch to HTTPS right now?
It is high time to switch to HTTPS. The most important question lingering here is Why to move to HTTPS? […]
Avoiding the rising DNS Binding Attacks for the smart devices
What is a DNS Rebinding Attack? DNS Rebinding Attacks are where the attacker tricks the user into binding with malicious […]
FelixRoot Backdoor Malware Resurfaced in a recent Campaign
Felixroot Backdoor was first spotted in September 2017 in Ukraine spreading through pernicious banking documents with macros downloading the back […]
Is implementing DMARC a cake walk or a tedious job?
It is a cliché in IT industry for people to judge software or a protocol even before using it. Many […]
FlawedAmmyy RAT being delivered via TA505 email spam campaigns
Always be cautious while opening email attachments. Recently, hackers have been sending weaponized PDFs containing malicious SettingContent-ms files containing FlawedAmmyy […]
Emotet Malware spreading extensively via Microsoft Documents in emails
Hackers are trying to deliver Emotet malware by attaching it to Microsoft Office document via email. Many US citizens were […]
Cloud Technology has brought in a paradigm shift in Storing Data
Cloud Computing has flourished enormously over the past few years. It has changed the concept of data storage altogether. Every […]
Indian BFSI Sector needs to be prepared for upcoming data protection laws
The increase in financial crimes is not only a threat to BFSI (Banking, Financial Services and Insurance) companies but it […]
What is DMARC? Why is it important for your business?
What is DMARC? DMARC (Domain-based Message Authentication, Reporting and Conformance) is a technology advancement in preventing email and domain spoofing. […]
Bypass glitch makes Mac OS vulnerable due to improper code-signing implementation
A bypass found in third party developers’ interpretation of code signing API allowed for unsigned malicious code to appear to […]
Beware of this Top 10 most misused Domains
In the latest research it is revealed that, some of the latest TLDs (Top-Level Domains) such as .men, .work and […]
Stay protected from Domain Spoofing – Know all about it!
What is spoofing? Cyber criminal can easily impersonate or forges domains, IP or Email ids to steal confidential information . […]
How to differentiate rogue URLs from the authentic ones
How can you identify if the domain is authentic or impostor? The answer may depend on your knowledge of Domain […]
Why Blockchain may not be the elixir to internet security
Every architect, builder and designer knows that the right tool can solve the most difficult problems in a jiffy but […]
Top 3 cyber security concepts for 2018
Cyber security is taking a new turn every year. Its very crucial to stay updated with the latest cyber security […]
Maintaining Control is vital to Data Protection
It is of prime importance to any organization to identify sensitive information and control access to it. Data Protection is […]
Beware of Fake Email IDs
A lot of scams are happening via fake email IDs. Whether you are an IT employee, bank employee or a […]
Cyber Security challenges for CXO
Technology is evolving rapidly and so are the cyber risks. It is a big responsibility on the shoulders of CXO […]
Internet Explorer Zero-day “Double-kill”
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could […]
Cryptojacking Attack hits Aditya Birla Group
A big cryptojacking attack took place first time in the country last month. The target was the Aditya Birla Group […]
ODNS would be an internet security breakthrough
The DNS is essentially a phonebook for the Internet’s domain names. When any device makes the first request over the […]
Cyber criminals have discovered a new way to bypass Office 365 Safe Links
Microsoft’s Advanced Threat Protection (ATP) includes a feature called Safe Links. Office 365 Safe Links basically curb all the malicious […]
Data hacked during EPFO-Aadhar seeding
Cyber criminals seem to have hacked the EPFO data which holds information like name, Aadhar card number, bank details of […]
Smartly defining RPO and RTO for Disaster Recovery Plans
Recovery Point Objective (RPO) and Recovery Time Objective (RTO) are 2 most important parameters for a disaster recovery and business […]
Formbook Malware spreading widely by clicking Microsoft URL shortcut files in your emails
Be careful when you receive attachments to an email, it can be an entry point to Formbook Malware. Formbook malware […]
CIOs must run a customer centric business
It is high time for CIOs to run a customer centric business. In today’s world, where there are so many […]
Indian Government needs to give cyber security an equal priority to border security
Digital India is no more a dream but carving into an absolute reality. The steps taken by the government to […]
Rarog – A cryptomining Trojan is out in the wild
A malware family Rarog is out in the internet and being excessively used by the cyber criminals to execute cryptocurrency […]
Private Cloud vs Public Cloud. Making the perfect choice!
Embracing cloud technology is no longer a choice but an inevitable business move. However migrating to cloud is not an […]
Slingshot, an APT Malware making its way through routers in the Network
An APT (Advanced Persistent Threat) malware, Slingshot, attacks victims by entering via routers and gaining kernel access to control the […]
Microsoft Office 365 provides new Advanced Security Features
Microsoft Office 365 is widely popular work office suite, among the SMBs. Hence, no doubt that it has become one […]
Is blockchain the alchemy to DDoS attacks?
DDoS(Denial of Distributed Service) attack is a type of cyber attack that involves a large number of computers and huge […]
Optimizing Disaster Recovery plans to get the best results
To assume that IT disaster will not happen to your organization because of its upbeat security and support is living […]
The rising and falling cyber security trends in 2018
Current Rising Trends of Cyber Security AI/Machine Learning is picking up Artificial Intelligence(AI) has the power to learn catch up […]
Latest technology innovations affecting cyber security
Technology is building our future, there is no denying but with every new innovation comes new vulnerabilities and hence the […]
Preventive measures for the growing DDoS Attacks
DDoS(Denial of Distributed Service) attack is a type of cyber attack that involves a large number of computers and huge […]
How cloud is influencing the roles and responsibilities of CIO?
Cloud has had a gigantic effect on the software industry. And its impact on CIO’s roles and responsibilities is dominant. […]
With the increasing third party leaks, Aadhar Card systems need security reviews
Aadhar Card database is by far one of the largest government databases on this planet consisting of more than 111 […]
How CIO can spread cyber security awareness among the employees
Cyber security hacks and breaches have become more widespread and are more damaging now than ever before. In the previous […]
Critical takeaways for CIOs from the 2017 cyber crimes!
Cyber security of an organization has evolved dramatically over the last decade. In 2017, many such cyber security attacks and […]
Cloud based security and analytics is the key to network protection
Cloud based security and analytics is a service model in which a key element of security or data analytics is […]
Hacked email? Things you must do
So, your email has been hacked! Well this is very likely in the age of ransomware and malware attacks and […]
India is amongst the top financial markets open to Ransomware attacks!
India is growing, while economy is set to hit the $10trillion mark in a decade or so, clearly it is […]
How can Zimbra VPS enhance your Top-line
Zimbra Virtual Private servers hosting plans are highly customizable and can be scaled with your rapidly changing business needs. The […]
Are you ready to migrate to HTTPS?
With just a couple of months to go before HTTP (Hypertext Transfer Protocol) web pages being marked as insecure, are […]
5 Must Security Precautions while using third party softwares
The default Operating systems are becoming more and more resistant to attacks and hence most of the attacks take place […]
Secure your website before Google’s Chrome marks it Insecure!
Google has announced that starting in July, it will mark all HTTP sites as ‘not secure’. With the release of Chrome […]
Cloud-to-Cloud Backup Technology
Cloud technology has been growing for some time now and will become mainstream in near future. It has many advantages […]
5 things your IT Disaster Recovery Plan should cover
To assume that IT disaster will not happen to your organization because of its upbeat security and support is living […]
Leverage the Office 365 Collaboration tools
Flexibility, mobility and simplicity is demand of the businesses. Office 365 and Sharepoint are excellent tools in the area of […]
What is SSL and why do I need it?
An SSL certificate is basically a piece of software(read codes) that you install on a server that allows you to […]
Logix Infosecurity Achieves ISO 9001:2015 Certification
Serving with the best in class quality products & services since 1999, Logix is proud to announce its successful ISO 9001:2015 […]
Email security in 2018
2017 had a long list of email attacks, spear phishing, whaling, phishing, scams, email impersonation etc, clearly a wide range […]
HC7 Gotya Ransomware
Another Ransomware, another day, another danger in the cyber space! To bring the discussion into perspective- A company is hit […]
Cyber security predictions for 2018
2017 kept the information security officers on toes. Something or the other happened and cyber criminals per persistent with successful […]
Keep your information secured without hindering sharing operations
Information rights management gives you the power to control information within the company as well as extend the control after […]
Locky Ransomware- Why this malware just won’t perish? Ykcol and Asasin- 2 more variants
Within less than a month, 2 new version of Locky ransomware have been released. YKCOL, locky spelled backwards and ASASIN […]
Email security with Office 365!
Business communication is synonymous to e-mails. A lot of sensitive and crucial information gets transferred via the medium all the […]
Cyber-Security Awareness Month. Things you need to be aware of
Since 2003, October every year is recognized as the cyber security awareness month. It is a good measure to spread […]
ANUBI Ransomware, new danger ready to strike!
ANUBI is another malicious code making rounds, infecting machines. Not much is known about the attack tactics used by the […]
Zimbra Collaboration Two-factor Authentication: Be more Secure
Two-factor authentication, or 2FA as it is commonly abbreviated, is a technology that provides identification of users with the combination […]
Why Zimbra 8.8 ?
A well crafted collaboration platform can increase productivity of your company significantly. Team cannot collaborate if they cannot communicate efficiently […]
Advanced email security for e-mail hoax. Be safe!
Email are the lifeline of business communication and have been an important vehicle for cyber intrusion for cyber criminals.The sheer […]
CIO Strategies for selecting the best-in-class Collaboration Tool
Imagine working on a new software launch where the designers, engineers and marketing teams are spread across different countries and […]
How to avoid Equifax breach with regular Vulnerability Assessments ?
Ever higher than before, the frequency and scale of cyber breaches continue to startle everyone. In this case, cyber thieves, […]
[Infographic] 5 Stages of Ransomware
Advanced Ransomware Threats are well planned by cyber criminals in order to acquire highest gains. Cyber criminals takes in the most […]
Xafecopy Trojan widespread in Android mobile devices
A new mobile malware Xafecopy Trojan has been detected in India, Kaspersky said in a report. It steals money from […]
711 million e-mails snared in largest spam-bot
A Paris-based security researcher, going by the pseudonymous handle ‘Benkow’, discovered an open and accessible web server hosted in the […]
Red Alert ! Bring Locky Ransomware turbulence under control before it causes havoc !
Indian government issued a warning about Locky ransomware attack on September 2, 2017. According to the researchers, this ransomware is […]
Why SMBs are the best target for latest cyber attacks?
Small and medium scale businesses (SMBs) of all streaks are at higher risk to latest cyber attacks compared to large […]
How to be safe when cloud has become a new home of cyber criminals
Cloud computing is the technology which is slowly sweeping the way organizations interact with technology and store information. With organizations […]
Save billions by including cyber security within business strategy
Technology changes much faster than most business can keep up. The proliferation of mobile technology, the Internet of Things (IoT) […]
Economic Impact of cyber-attacks on SMBs in 2017
Cyber-criminals are now targeting Small and medium business enterprises to extort fees. Ransomware, a kind of malware that, usually, limits […]
CIO strategies for preventing new security breaches
Digital transformation has ensured that cybersecurity is the biggest concern facing CIOs. As we proceed further in the 4th industrial […]
Strategic risks of a cyber-attack in 2017!
Open and digitally inter-connected technology platforms are shaping future of businesses. As the migration to digital platforms happen, hackers get […]
Diablo6 – a variant of Locky Ransomware
Many ransomwares continue to spread because email is ubiquitous and users are not cautious to maintaining cyber security. Such is […]
How to invest smartly using cyber security metrices!
In the hoax, usually companies end up spending blindly on the most crucial cyber security metrices, they need for their […]
Which is the most apt vaccine for 2017 epidemic: Cyber-Attacks?
With Internet, digitization, automation transformation taking center stage, cybersecurity turns up as one of the biggest concern. Email remains the […]
In 2017, to save yourself from hackers make DLP and cyber security walk hand in hand
Every business today is on networked computer systems in order to achieve higher work efficiency with smooth collaboration, storage and […]
Use your own Data wisely to detect an attack!
Perennial, for a problem to exist that cyber-criminals areahead of security measures deployed. Your own data can be used effectively […]
Cyber threats may wreak Havoc by 2020
India will face increasingly sophisticated “destructive” cyber threats as compared to the current scenario which is adding up to 200 […]
India 8th targeted country for web application attacks!
India is one of the top target countries for DDoS attacks. With 11.1 million attacks, India ranked 4th while US […]
Securing your email and network requires a paradigm shift in Mindset
Nearly every day a successful digital breach is reported. Major organizations, government bodies, hospitals, companies, public offices have been victims […]
Increase Threat Hunting beyond ATP Tools
ATP tools are the core of most of the cyber-crime fighting software’s. Today, we have a generation of products from […]
Do you know, if there is an intruder in your network!
You need to believe that you are being compromised before you start helping your organization stay secure. Intruders can very […]
Current Cyber-heist- Not just personal or corporate!
Yes, you read that right. Cyber criminals are not just after your personal or corporate data of the companies but […]
Website leaks data of 120 million Reliance Jio users, Telco claims data is safe?
This could be the biggest data breach in India. The data is supposedly leaked on a website called magicapk. The […]
5 ways to monitor DNS traffic for security threats
Monitoring DNS traffic can reveal a lot about Botnets on your network. Botnet-assisted Distributed denial of service (DDoS) attacks are […]
Cyber Security Lessons to learn from the latest RNC Data Leak
Important lessons are learned the hard way. Republican National Committee (RNC) hired Deep Root Analytics, a data analytics firm to […]
SMBv1- a very old protocol causing Wanna-Cry: should it be disabled?
SMBv1 isn’t safe and what-so-ever update you run or patch you update the problem is- you are still running SMB1. […]
Steps to stop targeted and advanced threats
Targeted attacks reap big rewards. Large organizations and institutions have faced a sophisticated attacks and millions of customer data has […]
Petya Ransomware is back to cause havoc
The world suffered another wreaking nightmare on Tuesday with the attack of a new NotPetya ransomware. Using the same malicious […]
How to protect your Cloud Files on Office 365
Cloud computing has been around for quite some time now and it has changed the way we work. The productivity […]
How to select best email archiving solution for your company?
A very important task is selecting an e-mail archiving product. Since archiving is a long-term proposition, so it’s crucial to […]
Why do companies need Sandboxing?
A sandbox gives you a chance to look into the future. It creates a security mechanism in which a separate, […]
Chinese Fireball Malware affects 250 Mn computers. India most affected.
Possibly the largest malware infection operation in the history is on its way with Fireball Malware. The Chinese malware is […]
UIWIX Ransomware. The threat of WannaCry is not over yet.
The evolved version of Wannacry ransomware; UIWIX Ransomware continues to shock the world. WannaCry Ransomware began spreading on May 12th […]
WannaCry Ransomware: How it affected India? What could be done to keep safe? What is next?
The Ransomware that shock the world started on 12th May as a massive cyber-attack no one has ever seen. By […]
The latest global cyberattack – Wannacry Ransomware.
On May 12th 2017, a ransomware of WannaCry or Wcry started spreading like wildfire starting from NHS system in UK. […]
Received a new job offer? Beware- Genuine or Fake?
Scammers are on the rise with more and more fictitious job offers appearing on job boards. More job seekers are […]
Which is the best choice for your organization- Shared or Dedicated web hosting?
Running a mid-sized business; choosing between a shared and dedicated web hosting can be a big challenge. Even when companies […]
Why do companies need responsive web design?
Responsive web design is an approach to creating web sites which can be viewed on any device; a mobile, a […]
Matrix Ransomware: Spreading to PCs through Malicious Shortcuts
The latest addition to the growing threat of ransomware is the Matrix Ransomware. Though the ransomware has been active for […]
What is Penetration Testing? And Why is it important for your organization?
Penetration testing or commonly known as pen testing is another important way of testing your company’s preparedness for a cyber-attack. […]
Dangers of Crypto-Ransomware and ways companies can avoid it!
Money makes ransomware the lucrative cyber theft option. Crypto-Ransomware is a type of ransomware that encrypts files on a user’s […]
Red-team Exercise: Explore your companies Vulnerabilities to Cyber-attack in 2017!
Red-team cyber security testing is optimally designed to measure how well your company’s defense and response capabilities will hold under […]
A classic ICICI Bank Email phishing in 2017
Are you using internet banking ? How secure are your financial transactions ? Do you scan your bank emails thoroughly ? How can you know […]
How are Locky and Cerber Ransomware Skilled at hiding themselves?
2 of the 3 major ransomware families responsible for 90% of ransomware attacks are Locky and Cerber Ransomware families. They […]
Staying ahead of the Cyber Security curve
IoT devices are set to revolutionize our lives. Companies are using IoT devices more than ever with automation and more […]
PetrWrap: Cybercriminals stealing code from one another
The latest version of Petya based ransomware is PetrWrap. Petya ransomware has been distributed as ransomware-as-a-service wherein the creator of […]
Finding the appropriate Content Management System(CMS) for your Organization
In today’s market, you can find a Content Management System(CMS) at arm’s length. How do you pick the right content […]
Kirk Ransomware: Star trek themed malware!
A new piece of ransomware has surfaced featuring star trek theme, named Kirk Ransomware, the first of its kind ransomware […]
Addressing the cyber security for your company
There are multiple facets of cyber threats and so are multiple things to do to secure the cyber domain of […]
How to select web development company in India?
Web has unprecedented increase in traffic. Businesses run from websites with the advent of e-commerce. Billions of dollars’ worth of […]
Selecting A Cloud Firewall System
Cloud, the ease of use which comes with it and of course cloud firewall system has become the most talked-about […]
Lawful Implementation of DLP Plan in India
Data loss prevention (DLP) systems are crucial tools for the safeguards of intellectual property and business secrets. IT is the […]
New target for hackers this year : Mac OS
A second example of Malware targeting Mac OS has surfaced in the past few weeks. Macro is a series of […]
The growing threat of GoldenEye Ransomware Attack
The latest version of Petya ransomware, GoldenEye, is attacking HR department with fake job applications loaded with the virus. It […]
Ransomware Spora: Everything you should know about it
Spora is the latest ransomware trojan which is highly sophisticated in its attacks and well crafted. Security experts already believe […]
The Home Ministry’s website hacked on 2017 February 12
On 12th February, 2017 the home ministry’s website got hacked. Attacks on our digital borders have been increasing for some […]
Cyber-crime marks a start of 2017 with Indian Banks Infiltration
Indian banks are more vulnerable to cyber-crime, infiltration and data leaks with the start of 2017. Note-ban has pushed up […]
4 Reasons why data backup is vital for your organization?
Irrespective of the size of your organization, data is an important part of your business. Loss of data can directly […]
5 reasons why organization needs Data Loss Prevention or DLP Solution?
Your organization will have at least some sensitive data to protect from thieves and hackers. In this technology world, such […]
Increased popularity of Microsoft Office 365 in consumer & Enterprise in 2017
We generally think Microsoft dominated the enterprise apps segment only.But we forget that even our personal life revolves around Microsoft […]
Is a free email solution right for your company?
When you are a startup or starting a new business, cash becomes the real challenge that point of time. Any […]
5 Common Security mistakes that is putting your privacy at risks in 2019
How secure is your data? Ask yourself this question before it is too late to make amends. In order to […]
How can a company choose a good data loss prevention system solution
Companies look for data loss prevention system solutions to prevent costly data security breaches. There are several things to be […]
5 Factors to consider while choosing business email hosting service provider
Choosing an email hosting service provider is vital to the business. Thus it is important to think and decide on […]
Cloud Email Vs On-premise : Statistics and growth
The cloud email market is still in the early stages of adoption with 13 percent of identified publicly listed companies […]
Alert!! Alert!! Alert!! : This is one of the most scary Gmail Phishing Attack 2017
If you are a Gmail user and keeping every Personal documents and Bank Details in your gmail account then you […]
How challenging it is for companies like Google, Apple to fight battle against Cyber Security Threats?
Ransomware, DDoS Attacks, IoT Based machine to machine attacks and all upcoming attacks are changing the language of Cybersecurity Threats.Every […]
5 new names in cybersecurity investigations you may not have heard about
There are few names which has come while doing cybersecurity investigations in 2016. We thought you may not heard about […]
India Pakistan Cyber War in full throttle with new Ransomware attacks this new year 2017
When the whole world is busy with New year Celebration National Security Guard website got hacked, defaced with an abusive […]
Will Healthcare and Education Industry remain target for Cyber criminals in 2017?
Healthcare and Education records represent an extremely attractive target for cyber criminals in 2016. Will that continue in 2017? Healthcare […]
Microsoft Launched “Microsoft Teams” Collaboration Workspace – What’s new?
On November 2016, Microsoft launched Microsoft Teams. This chat-based team tool is made to be a one-stop look hub for […]
Transactional Emails vs Marketing Emails
Transaction Emails Transaction emails are the emails which are in most cases auto-generated emails from the server in response to […]
5 Email Phishing and Email Spoofing Prevention Tips
Email Spoofing and Email phishing attacks are more rampant than ever. Phishing Emails flow right into your Mailbox all around […]
3 Key Enterprise Messaging and Collaboration Trends to watch out in 2017
As digitalisation continues to unfold, interaction with partners and customers is changing into progressively vital for businesses. According to Gartner Top […]
6 Website Security Best Practices you must follow in 2017
In today’s world, every day we witness a new attack on website done by professional hackers. While hearing such news, […]
7 Critical Facts tells how IoT can cause cyber security threats in 2017
According to marketsandmarkets The Internet of Things market size is estimated to grow from USD 157.05 Billion in 2016 to […]
2017 Cyber Security Market, Trends and Predictions India and Global
Alarming Cybercrime is making it difficult for analyst and Research firms to accurately forecast cybersecurity spending. Yet we are covering […]
Thinking About DdoS Attack Protection? 4 Reasons Why It’s Time To Stop!
DDoS(Denial of Distributed Service) attack is a type of cyber attack that involves a large number of computers and huge […]
What to expect new in cyber security trends in 2017
In 2016 Spoofing, ransomware, phishing, and IoT-based DDoS attacks hit business and consumers. What to expect now in cyber security trends […]
Logix Infosecurity : Microsoft office 365 partner in Coimbatore
If you are looking for Microsoft office 365 partner in Coimbatore, your search ends here with us at Logix Infosecurity […]
Logix Infosecurity : Microsoft office 365 partner in Ahmedabad
If you are looking for Microsoft office 365 partner in Ahmedabad, your search ends here with us at Logix Infosecurity […]