Maintaining Control is vital to Data Protection It is of prime importance to any organization to identify sensitive information and control access to it. Data Protection is […] Read more
Beware of Fake Email IDs A lot of scams are happening via fake email IDs. Whether you are an IT employee, bank employee or a […] Read more
Cyber Security challenges for CXO Technology is evolving rapidly and so are the cyber risks. It is a big responsibility on the shoulders of CXO […] Read more
Internet Explorer Zero-day “Double-kill” A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could […] Read more
Cryptojacking Attack hits Aditya Birla Group A big cryptojacking attack took place first time in the country last month. The target was the Aditya Birla Group […] Read more
ODNS would be an internet security breakthrough The DNS is essentially a phonebook for the Internet’s domain names. When any device makes the first request over the […] Read more
Cyber criminals have discovered a new way to bypass Office 365 Safe Links Microsoft’s Advanced Threat Protection (ATP) includes a feature called Safe Links. Office 365 Safe Links basically curb all the malicious […] Read more
Data hacked during EPFO-Aadhar seeding Cyber criminals seem to have hacked the EPFO data which holds information like name, Aadhar card number, bank details of […] Read more
Smartly defining RPO and RTO for Disaster Recovery Plans Recovery Point Objective (RPO) and Recovery Time Objective (RTO) are 2 most important parameters for a disaster recovery and business […] Read more
Formbook Malware spreading widely by clicking Microsoft URL shortcut files in your emails Be careful when you receive attachments to an email, it can be an entry point to Formbook Malware. Formbook malware […] Read more