Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog27 August 2018World’s largest companies have adopted to DMARCs reject policyLarge companies across the world receive phishing emails every day. There are...
-
Blog26 August 2018Cyber security basics are must for all. Be it Sales, HR or Engineer!All the departments of the organization have access to different kinds of...
-
Blog16 August 2018Cyber criminals siphoned Rs 94 crore off a co-operative bank in PuneCyber criminals stole over Rs 94 crore from a Pune headquartered Cosmos...
-
Blog1 August 2018CFOs need to work closely with CIOs to stay Cyber Secure2017 was an eventful year with high profile data breaches and notable...
-
Blog20 July 2018Are your website images secured?Malware can enter your machine through corrupted images on any website. Malware...
-
Blog17 July 2018Why you must switch to HTTPS right now?It is high time to switch to HTTPS. The most important question...
-
Blog14 July 2018Avoiding the rising DNS Binding Attacks for the smart devicesWhat is a DNS Rebinding Attack? DNS Rebinding Attacks are where the...
-
Blog12 July 2018FelixRoot Backdoor Malware Resurfaced in a recent CampaignFelixroot Backdoor was first spotted in September 2017 in Ukraine spreading through...
-
Blog11 July 2018Is implementing DMARC a cake walk or a tedious job?It is a cliché in IT industry for people to judge software...
-
Blog7 July 2018FlawedAmmyy RAT being delivered via TA505 email spam campaignsAlways be cautious while opening email attachments. Recently, hackers have been sending...
-
Secure Microsoft 365 Email with Cisco Cloud Mailbox Defense
In this blog, we are going over ways you can improve your...
-
Ukraine faces cyber trouble – Ukrainian bank and State websites hit
Global situations with respect to Ukraine are dire. But along with geopolitical...
-
Corporate email server breach – activities of Squirrelwaffle
An email server breach at Microsoft’s Exchange servers was detected by a...
-
A phishing attack through spoofed Amazon orders
This phishing attack takes brand impersonation to the next level. Not only...
-
Statistics to prepare you for cybersecurity in 2022
Everyone was just waiting for the calendar to turn on 31st December...
-
The biggest internet scams – and how to stop them
Phishing is a popular internet scam that has been claiming victims by...
-
Blog 10 May 2021 Exchange Email Hack -
Blog 29 April 2021 Growing Concerns of Credential Theft Cases -
Blog 26 April 2021 What is an SSL Certificate and why is it important? -
Blog 22 April 2021 EU Banking Regulator Victimized by Microsoft Email Hack -
Blog 20 April 2021 4 New Hacker Groups Target Microsoft Email Servers -
Blog 14 April 2021 Microsoft Exchange Server Flaws Affect 30,000 Companies
-
Exchange Email HackThe Rampage Continues Vulnerabilities in a major player’s server architecture is an...
-
Growing Concerns of Credential Theft CasesDeep research into cyber security threat patterns has revealed some trends in...
-
What is an SSL Certificate and why is it important?Why worry about an SSL Certificate? There are a lot of little...
-
EU Banking Regulator Victimized by Microsoft Email HackMajor Financial Institution Compromised The European Banking Authority, one of the foremost...
-
4 New Hacker Groups Target Microsoft Email ServersAfter the focused attacks on Microsoft email servers by alleged state-sponsored hacking...
-
Microsoft Exchange Server Flaws Affect 30,000 CompaniesA slow-burn cyber breach has been transpiring since January, only recently coming...