Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog25 December 2019Emotet botnet malware hidden within fake Christmas party invitesBeware: Your Christmas party emails could be infected with malware Nobody likes...
-
Blog23 December 2019Microsoft Report on Cleverest Phishing TacticsMicrosoft Reports on the Cleverest Phishing Tactics of 2019 While for individuals...
-
Blog19 December 2019Best Practices For Online SecuritySecurity Practices for Your Business — How many can you check off...
-
Blog16 December 2019Ukraine Targeted by a Russian APT Hacker TeamRussian APT Hacker Team Strikes Out The Military and the Government are...
-
Blog12 December 2019Defence Ministry Targeted For PhishingWarning Issued for Defence Personnel The defence ministry has issued an emergency...
-
Blog9 December 2019Most Likely Phishing TargetsOrganizations Most at Risk of Phishing Phishing is a rapidly damaging cybercrime...
-
Blog2 December 2019Corporate Email HijackingCorporate Email Hijacking: Know how it’s done Businesses contribute heavily to the...
-
Blog28 November 2019Protection Against Online ScamsGuidelines to protect yourself against cyber-scamming Digitisation has seeped into virtually all...
-
Blog25 November 2019Cybercriminals target Windows 10 Update through Fake EmailsRansomware targets Windows 10 Update TrustWave SpiderLabs security researchers have uncovered a...
-
Blog20 November 2019Beware – A Phishing Attack through IT Refund MessageSmishing, a variant of phishing, attacks through SMS usually target individuals or...
-
4 Effective Email Marketing Campaigns for Small Businesses
Email marketing campaigns have proved to be the most ROI-positive marketing tools...
-
Understanding Simulated Phishing Campaigns with 5 Easy Steps
Simulated phishing campaigns to combat social engineering Phishing simulation is your tool...
-
Top 10 Open Source Software Threats
Software supply chains have been exploited more and more in the recent...
-
GPT responsible for new-age AI-assisted phishing attacks
Phishing attackers have been tricking users into divulging their credentials with phishing...
-
4 Useful DMARC Monitor Services to Protect Email Domain
What is DMARC? Before we dive into how DMARC Monitor services can...
-
The Logix Partnership Program
About Logix and its Partnerships with Domain Leaders Since 1999, Logix InfoSecurity...
-
Blog 10 June 2022 A Concise Guide on Email Security -
Blog 8 June 2022 A CrimsonRAT Among Indian Officials -
Blog 6 June 2022 Cybersecurity Projections for the Rest of 2022 [And beyond] -
Blog 2 June 2022 Improve Network Agility with Zero Trust -
Blog 1 June 2022 US Infrastructure Attacked by AvosLocker Ransomware -
Blog 31 May 2022 Microsoft Security Now Enhanced with New Multicloud Capabilities
-
A Concise Guide on Email SecurityEmail has become omnipresent. No matter which industry your business belongs to,...
-
A CrimsonRAT Among Indian OfficialsThreat actors belonging to the notorious Transparent Tribe group have launched another...
-
Cybersecurity Projections for the Rest of 2022 [And beyond]Unfortunately, us cybersecurity professionals do not need magical powers to look into...
-
Improve Network Agility with Zero TrustWhat is Network Agility? Network agility is the speed and ease with...
-
US Infrastructure Attacked by AvosLocker RansomwareHigher up authorities in the United States of America, including the FBI...
-
Microsoft Security Now Enhanced with New Multicloud CapabilitiesMicrosoft is often known for its dependability and comprehensive solutioning. However, customers...