Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog28 August 2019Ransomware: An insidious, evolving ThreatRansomware is considered one of the most dangerous threats to organizations across...
-
Blog23 August 2019Microsoft warns Users of phishing attacks using custom 404 PagesMicrosoft Security researchers discovered an unusual phishing campaign replicating their Microsoft login...
-
Blog21 August 2019India’s IoT Deployments suffered 22% more cyberattacks in Q2IoT deployments in India received the maximum number of attacks from a...
-
Blog21 August 2019Whale Phishing has risen to be a major cyber security threatA whale phishing attack is a specific type of phishing attack that targets high-profile...
-
Blog14 August 2019Top 3 cybersecurity threats of 2019Cybersecurity has risen ever higher up the corporate agenda for the very...
-
Blog9 August 2019Coping up with evolving priorities and challenges of CISOsWith the increasing cybersecurity attacks the role of CISOs have evolved drastically...
-
Blog6 August 2019FlawedAmmyy RAT Malware Attacks even patched windows Users, Beware!Always be cautious while opening email attachments. Recently, hackers have been sending...
-
Blog2 August 2019Visa Contactless cards are prone to big fraudsHackers have found new ways to bypass the payment limits on Visa contactless...
-
Blog31 July 2019Make your employees your Strongest link in Cyber SecurityYour company may be using the latest software, hardware and other resources...
-
Blog26 July 2019American Express customers targeted by Novel Phishing AttackAmerican Express customers were targeted with a Novel Phishing attack for stealing...
-
The Benefits of BIMI for Email Marketers
About BIMI (Brand Indicators for Message Identification) BIMI is an emerging email...
-
2022 Cloud Security Reports
Understanding cloud security insights Recent trends of remote working and off-site collaboration...
-
Microsoft Advanced Solutions for Better, Faster, and More Secure Work
Over the course of 2022-23, Microsoft is all set to release a...
-
The Importance of Digital Trust
Why digital trust - The changing trends of digital businesses The business...
-
Understanding Transport Layer Security (TLS)
When it comes to email security, it is not enough to enforce...
-
What is a firewall?
A firewall is an essential part of any network security setup. It...
-
Blog 7 January 2022 KYC registration agency gets vulnerability alert -
Blog 4 January 2022 Cyber incident highlights of 2021 -
Blog 29 December 2021 India’s biggest demat depository breached -
Blog 18 December 2021 Omicron phishing attacks already started -
Blog 15 December 2021 TodayZoo phishing kit creates the Franken-phish phishing monster -
Blog 13 December 2021 SBI customers lose money to a novel bank phishing attack
-
KYC registration agency gets vulnerability alertAn independent team of security researchers have identified a vulnerability in the...
-
-
India’s biggest demat depository breachedCentral Depository Services Ltd. (CDSL), a security firm liaised with the Bombay...
-
Omicron phishing attacks already startedBack when Covid-19 had started spreading around the March of 2020, we...
-
TodayZoo phishing kit creates the Franken-phish phishing monsterA bizarre phishing campaign is afoot, using a tool called as a...
-
SBI customers lose money to a novel bank phishing attackSeveral customers of the State Bank of India have started filing complaints...