Cyber criminals siphoned Rs 94 crore off a co-operative bank in Pune Cyber criminals stole over Rs 94 crore from a Pune headquartered Cosmos Bank. The money was allegedly transferred to accounts […] Read more
Mitre ATT&CK Framework: A boon to your company’s Red Team The MITRE ATT&CK Framework has become increasingly popular over the last few years. It was originally developed to support Mitre’s […] Read more
CFOs need to work closely with CIOs to stay Cyber Secure 2017 was an eventful year with high profile data breaches and notable cyber criminal activities. 2018 doesn’t look any comforting […] Read more
Are your website images secured? Malware can enter your machine through corrupted images on any website. Malware is stored in Exchangeable Image File Format (EXIF) […] Read more
Why you must switch to HTTPS right now? It is high time to switch to HTTPS. The most important question lingering here is Why to move to HTTPS? […] Read more
Avoiding the rising DNS Binding Attacks for the smart devices What is a DNS Rebinding Attack? DNS Rebinding Attacks are where the attacker tricks the user into binding with malicious […] Read more
FelixRoot Backdoor Malware Resurfaced in a recent Campaign Felixroot Backdoor was first spotted in September 2017 in Ukraine spreading through pernicious banking documents with macros downloading the back […] Read more
Is implementing DMARC a cake walk or a tedious job? It is a cliché in IT industry for people to judge software or a protocol even before using it. Many […] Read more
FlawedAmmyy RAT being delivered via TA505 email spam campaigns Always be cautious while opening email attachments. Recently, hackers have been sending weaponized PDFs containing malicious SettingContent-ms files containing FlawedAmmyy […] Read more
Emotet Malware spreading extensively via Microsoft Documents in emails Hackers are trying to deliver Emotet malware by attaching it to Microsoft Office document via email. Many US citizens were […] Read more