Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog25 November 2018Increasing Phishing attacks in IndiaPhishing is on the rise in the country. India is among the...
-
Blog22 November 2018Latest DNS Spoofing attacks use fragmented datagrams. Can you avoid it?With a little attention, as it turns out, one can spoof fake...
-
Blog15 November 2018Prevent the Fileless Attacks for your Windows PCWhat is a Fileless or non-malware attack A non-malware attack is one...
-
Blog13 November 2018India witnessed over 4.36 lakh cyberattacks in the first half of 2018India ranks 21st in the global tally with 6,95,396 attacks hackers across...
-
Blog9 November 2018Ransomware Action Plan for Indian BusinessesSometime in May last year the world woke up to the menace...
-
Blog3 November 2018Penetration Test vs Vulnerability Assessment. Choose wisely, stay protected.It is definitely surprising that most people take penetration testing for vulnerability...
-
Blog2 November 201810 warning Signs of malware on your systemThere are innumerable amounts of malwares lurking around the internet. Do you...
-
Blog31 October 20182 million network storage devices affected by unpatched zero-day vulnerabilities!Network storage devices (NAS), are critical for small and medium businesses as...
-
Blog31 October 2018Facebook’s massive Data breach: what you need to knowThe worries for facebook do not seem to stop with cambridge analytica...
-
-
Expeditors Ransomware Attacks Put Company in Trouble
Expeditors, an American logistics and freight transport company based out Washington, USA,...
-
Save Mailbox Space with Single Instance Storage of Cloud Zimbra
Save mailbox space? It's possible that the thought hasn't even crossed your...
-
Puma Data Breach – Effects of Kronos Ransomware Attacks
The Kronos Private Cloud (KPC), which caters to several companies, recently fell...
-
Data Privacy Needs Intensify – Corporate Instagram Account Hijacking
Data has become as equally profitable for hackers as money. They can...
-
Email Security Best Practices for Small Businesses
In a previous blog, we discussed why professional email is a necessity...
-
A Recap of our imMail Webinar
Logix, in partnership with imMail, recently conducted a joint webinar that turned...
-
Blog 20 July 2021 Widespread Ransomware 2.0 attacks -
Blog 19 July 2021 Government domains breached – official government data at risk -
Blog 13 July 2021 India faces 213 weekly ransomware attacks -
Blog 6 July 2021 Remote Access Trojan – Your Passwords at Risk -
Blog 28 June 2021 Security Threats in Banking and How to Handle Them -
Blog 22 June 2021 Reasons India Needs Better Cybersecurity in Banking
-
-
Government domains breached – official government data at riskGovernment officials are under threat of a phishing campaign as ids of...
-
India faces 213 weekly ransomware attacksFollowing the 2020 email hacking riot, 2021 did not let us off...
-
Remote Access Trojan – Your Passwords at RiskA new variant of an old trojan has now been activated, putting...
-
Security Threats in Banking and How to Handle ThemSecurity threats in banking are becoming much more dangerous. Especially considering how...
-
Reasons India Needs Better Cybersecurity in BankingBanking in India is a very structured and regulated. Banks realize they're...