Increasing Abused Emails – How bad is it for your company’s brand repute On an average 75 % of the bulk emails reach the Inbox of the intended recipient, according to an Email […] Read more
Defending the New Generation phishing attacks Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal […] Read more
Are we still lagging behind the attack vendors? Stack Overflow and Canva attacked by hackers! Last month, 2 major data breaches took place showing how companies are lagging behind in fulfilling the attack vectors. Its […] Read more
Andheri Advertisement firm looses 12 lakh INR to cyber criminals An advertising company in Andheri was cheated of Rs.12 Lakh in a ‘man-in-the-middle’ attack. A man-in-the-middle attack allows a malicious actor […] Read more
Office 365 users combat targeted phishing attacks better with Cisco’s Email Security Microsoft Office 365 has become the most widely used e-mail service in the market. Being the most popular and most […] Read more
India ranks second in cyber attacks with 38 attacks per second India is a country with the second-largest number of account take-over logins – close to 1.38 lakh login’s per hour […] Read more
Top 7 tips to prevent Email Phishing and Email Spoofing Attacks Email Spoofing and Email phishing attacks are more rampant than ever. Phishing Emails flow right into your Mailbox all around […] Read more
Ransomware hits Telangana and AP’s power utilities The websites of Telangana State Southern Power Distribution Company Ltd (TSSPDCL) and its AP counterpart encountered a ransomware attack a […] Read more
Dark Web Exposes Computer-Server Data Transfer to Hackers As startling as it may sound but cybercriminals now have access to the most-secured data files used to facilitate confidential […] Read more
IMAP is the most exploited protocol. Office 365 and G Suite cloud accounts hacked One thing leads to another like a domino, with access to leaked credentials dumps, the speed and efficiency of brute-force […] Read more