Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog1 August 2018CFOs need to work closely with CIOs to stay Cyber Secure2017 was an eventful year with high profile data breaches and notable...
-
Blog20 July 2018Are your website images secured?Malware can enter your machine through corrupted images on any website. Malware...
-
Blog17 July 2018Why you must switch to HTTPS right now?It is high time to switch to HTTPS. The most important question...
-
Blog14 July 2018Avoiding the rising DNS Binding Attacks for the smart devicesWhat is a DNS Rebinding Attack? DNS Rebinding Attacks are where the...
-
Blog12 July 2018FelixRoot Backdoor Malware Resurfaced in a recent CampaignFelixroot Backdoor was first spotted in September 2017 in Ukraine spreading through...
-
Blog11 July 2018Is implementing DMARC a cake walk or a tedious job?It is a cliché in IT industry for people to judge software...
-
Blog7 July 2018FlawedAmmyy RAT being delivered via TA505 email spam campaignsAlways be cautious while opening email attachments. Recently, hackers have been sending...
-
Blog3 July 2018Emotet Malware spreading extensively via Microsoft Documents in emailsHackers are trying to deliver Emotet malware by attaching it to Microsoft...
-
Blog30 June 2018Cloud Technology has brought in a paradigm shift in Storing DataCloud Computing has flourished enormously over the past few years. It has...
-
Ikea Email Server Attacks
Ikea, popular furnishing company, faces the heat of cybercrime as Ikea email...
-
Proofpoint Phishing Attack Harvests Email Logins
In a recent Proofpoint phishing attack, email logins for Microsoft and Google...
-
Secure Microsoft 365 Email with Cisco Cloud Mailbox Defense
In this blog, we are going over ways you can improve your...
-
Ukraine faces cyber trouble – Ukrainian bank and State websites hit
Global situations with respect to Ukraine are dire. But along with geopolitical...
-
Corporate email server breach – activities of Squirrelwaffle
An email server breach at Microsoft’s Exchange servers was detected by a...
-
A phishing attack through spoofed Amazon orders
This phishing attack takes brand impersonation to the next level. Not only...
-
Blog 21 May 2021 Celsius Data Breach – Phishing Claims More Victims -
Blog 20 May 2021 Ransomware Attack At Realty Firm– Possible Data Loss -
Blog 12 May 2021 Banking Customers Fall Prey to Phishing Scams -
Blog 10 May 2021 Exchange Email Hack -
Blog 29 April 2021 Growing Concerns of Credential Theft Cases -
Blog 26 April 2021 What is an SSL Certificate and why is it important?
-
Celsius Data Breach – Phishing Claims More VictimsCelsius, a crypto lending service, recently learned of a security break at...
-
Ransomware Attack At Realty Firm– Possible Data LossA realty firm called Ansal Housing recently fell prey to a ransomware...
-
Banking Customers Fall Prey to Phishing ScamsSensitive banking information is always a matter of great anxiety for us...
-
Exchange Email HackThe Rampage Continues Vulnerabilities in a major player’s server architecture is an...
-
Growing Concerns of Credential Theft CasesDeep research into cyber security threat patterns has revealed some trends in...
-
What is an SSL Certificate and why is it important?Why worry about an SSL Certificate? There are a lot of little...