Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog13 January 2022Official FBI email servers hackedAn unidentified hacker group managed to get official FBI email servers hacked,...
-
Blog7 January 2022KYC registration agency gets vulnerability alertAn independent team of security researchers have identified a vulnerability in the...
-
Blog4 January 2022Cyber incident highlights of 2021Preparing for a secure 2022 We walk down memory lane today to...
-
Blog29 December 2021India’s biggest demat depository breachedCentral Depository Services Ltd. (CDSL), a security firm liaised with the Bombay...
-
Blog18 December 2021Omicron phishing attacks already startedBack when Covid-19 had started spreading around the March of 2020, we...
-
Blog15 December 2021TodayZoo phishing kit creates the Franken-phish phishing monsterA bizarre phishing campaign is afoot, using a tool called as a...
-
Blog13 December 2021SBI customers lose money to a novel bank phishing attackSeveral customers of the State Bank of India have started filing complaints...
-
Blog8 December 2021Do your best work with Microsoft 365 SolutionsMicrosoft 365 is here to provide the best integrate experience for your...
-
Blog3 December 2021Russian threat group after 14,000 Gmail accountsA Russian-linked hacker group, APT28, purported to have been on a month-long...
-
Blog2 December 2021The 7 worst data breaches of 2021Because every business is now online, it generates plenty more data than...
-
Enhance Your Office 365 Email Security with Check Point Harmony
Microsoft 365 is the most widely used and targeted email service globally....
-
Shift from Google Workspace to Zoho Workplace?
For any business to be able to thrive in today’s world, streamlining...
-
The Crucial Lesson of Data Backups: Protecting Your Business from Ex-Employee Sabotage
As recent events have shown, even the most robust systems can be...
-
The Evolution of Business Communication Compromise
Microsoft Teams has become a vital communication channel for many organizations. However,...
-
Logix Rolls Out Zoho Workplace Solutions
Logix InfoSecurity is now providing Zoho Workplace solutions, offering a comprehensive productivity...
-
Logix Adds Zoho Campaigns (Marketing Email) to its Portfolio
Zoho Campaigns empowers businesses to send marketing emails. With Zoho Campaign now...
-
Blog 9 February 2024 Strengthening Email Security for PCI DSS Compliance: The Role of DMARC -
Blog 9 February 2024 Zero-Day in Salesforce Email Services -
Blog 9 February 2024 The Rising Threat of ‘Phishing as a Service’ – How FraudGPT Exploits Generative AI -
Blog 9 February 2024 Evolving Cyberattack Landscape -
Blog 9 February 2024 Ransomware Attack on AIIMS Triggers India’s National Cybersecurity Response Framework -
BIMI 9 February 2024 Enhancing Customer Engagement with BIMI: The Key to Building Trust and Recognition
-
Strengthening Email Security for PCI DSS Compliance: The Role of DMARCPCI DSS (Payment Card Industry Data Security Standards) is a set of...
-
Zero-Day in Salesforce Email ServicesA recent spear-phishing campaign has brought to light the significance of staying...
-
The Rising Threat of ‘Phishing as a Service’ – How FraudGPT Exploits Generative AIThe power of Generative AI has given rise to both transformative advancements...
-
Evolving Cyberattack LandscapeThe cyberattack landscape is constantly evolving, with cybercriminals becoming more sophisticated in...
-
Ransomware Attack on AIIMS Triggers India’s National Cybersecurity Response FrameworkIn a significant move to bolster India's cybersecurity measures, the government has...
-
Enhancing Customer Engagement with BIMI: The Key to Building Trust and RecognitionBusinesses strive to stand out in the crowded online marketplace and foster...