Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog17 July 2018Why you must switch to HTTPS right now?It is high time to switch to HTTPS. The most important question...
-
Blog14 July 2018Avoiding the rising DNS Binding Attacks for the smart devicesWhat is a DNS Rebinding Attack? DNS Rebinding Attacks are where the...
-
Blog12 July 2018FelixRoot Backdoor Malware Resurfaced in a recent CampaignFelixroot Backdoor was first spotted in September 2017 in Ukraine spreading through...
-
Blog11 July 2018Is implementing DMARC a cake walk or a tedious job?It is a cliché in IT industry for people to judge software...
-
Blog7 July 2018FlawedAmmyy RAT being delivered via TA505 email spam campaignsAlways be cautious while opening email attachments. Recently, hackers have been sending...
-
Blog3 July 2018Emotet Malware spreading extensively via Microsoft Documents in emailsHackers are trying to deliver Emotet malware by attaching it to Microsoft...
-
Blog30 June 2018Cloud Technology has brought in a paradigm shift in Storing DataCloud Computing has flourished enormously over the past few years. It has...
-
Blog27 June 2018Indian BFSI Sector needs to be prepared for upcoming data protection lawsThe increase in financial crimes is not only a threat to BFSI...
-
Blog17 June 2018What is DMARC? Why is it important for your business?What is DMARC? DMARC (Domain-based Message Authentication, Reporting and Conformance) is a...
-
The biggest internet scams – and how to stop them
Phishing is a popular internet scam that has been claiming victims by...
-
New Emotet campaigns disrupting mailboxes
The Emotet malware seems to be back from its 10-month vacation. Mid...
-
Official FBI email servers hacked
An unidentified hacker group managed to get official FBI email servers hacked,...
-
KYC registration agency gets vulnerability alert
An independent team of security researchers have identified a vulnerability in the...
-
Cyber incident highlights of 2021
Preparing for a secure 2022 We walk down memory lane today to...
-
India’s biggest demat depository breached
Central Depository Services Ltd. (CDSL), a security firm liaised with the Bombay...
-
Blog 22 April 2021 EU Banking Regulator Victimized by Microsoft Email Hack -
Blog 20 April 2021 4 New Hacker Groups Target Microsoft Email Servers -
Blog 14 April 2021 Microsoft Exchange Server Flaws Affect 30,000 Companies -
Blog 6 April 2021 Hackers Target Government Officials Through Rogue Email ID -
Blog 2 April 2021 Getting a bonus is always good… unless it’s an advanced Bazar Trojan in disguise -
Blog 30 March 2021 Hosting Provider Phishing Scam
-
EU Banking Regulator Victimized by Microsoft Email HackMajor Financial Institution Compromised The European Banking Authority, one of the foremost...
-
4 New Hacker Groups Target Microsoft Email ServersAfter the focused attacks on Microsoft email servers by alleged state-sponsored hacking...
-
Microsoft Exchange Server Flaws Affect 30,000 CompaniesA slow-burn cyber breach has been transpiring since January, only recently coming...
-
Hackers Target Government Officials Through Rogue Email IDSeveral officials in the government were targeted for phishing through a rogue...
-
Getting a bonus is always good… unless it’s an advanced Bazar Trojan in disguiseSecurity researchers have found a deadly variant of a Bazar Trojan that...
-
Hosting Provider Phishing ScamCyber criminals will often use scare tactics to prod their victims into...