Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog27 May 2018Top 3 cyber security concepts for 2018Cyber security is taking a new turn every year. Its very crucial...
-
Blog26 May 2018Maintaining Control is vital to Data ProtectionIt is of prime importance to any organization to identify sensitive information...
-
Blog23 May 2018Beware of Fake Email IDsA lot of scams are happening via fake email IDs. Whether you...
-
Blog19 May 2018Cyber Security challenges for CXOTechnology is evolving rapidly and so are the cyber risks. It is...
-
Blog17 May 2018Internet Explorer Zero-day “Double-kill”A remote code execution vulnerability exists in the way that the VBScript...
-
Blog15 May 2018Cryptojacking Attack hits Aditya Birla GroupA big cryptojacking attack took place first time in the country last...
-
Blog11 May 2018ODNS would be an internet security breakthroughThe DNS is essentially a phonebook for the Internet’s domain names. When...
-
Blog11 May 2018Cyber criminals have discovered a new way to bypass Office 365 Safe LinksMicrosoft’s Advanced Threat Protection (ATP) includes a feature called Safe Links. Office...
-
Blog4 May 2018Data hacked during EPFO-Aadhar seedingCyber criminals seem to have hacked the EPFO data which holds information...
-
Blog25 April 2018Smartly defining RPO and RTO for Disaster Recovery PlansRecovery Point Objective (RPO) and Recovery Time Objective (RTO) are 2 most...
-
TodayZoo phishing kit creates the Franken-phish phishing monster
A bizarre phishing campaign is afoot, using a tool called as a...
-
SBI customers lose money to a novel bank phishing attack
Several customers of the State Bank of India have started filing complaints...
-
Cyber Security Advisory – Apache Log4J Remote Code Execution Vulnerability (CVE-2021-44228
Log4Shell: RCE 0-day exploit found in log4j2, a popular Java logging package....
-
Do your best work with Microsoft 365 Solutions
Microsoft 365 is here to provide the best integrate experience for your...
-
Russian threat group after 14,000 Gmail accounts
A Russian-linked hacker group, APT28, purported to have been on a month-long...
-
The 7 worst data breaches of 2021
Because every business is now online, it generates plenty more data than...
-
Blog 9 March 2021 Malwarebytes Hacked by The Same Group Behind SolarWinds Security Breach -
Blog 5 March 2021 Common Cyber Attacks You Should Know -
Blog 25 February 2021 Haryana Hackers Steal INR 1 Crore -
Blog 18 February 2021 Microsoft Fails to Block O365 Email Spoofing Attacks -
Blog 15 February 2021 What are the types of Network Security Devices? -
Blog 10 February 2021 Understanding Network Security
-
Malwarebytes Hacked by The Same Group Behind SolarWinds Security BreachCyber security firm themselves are lucrative targets for hackers. It is a...
-
Common Cyber Attacks You Should KnowIt is true that most common cyber attacks leverage gaps in technical...
-
Haryana Hackers Steal INR 1 CroreHaryana hackers defrauded ISGEC Heavy Engineering company and nicked an amount of...
-
Microsoft Fails to Block O365 Email Spoofing AttacksMicrosoft is under the gun again for cyber fraud. 200 million+ users...
-
What are the types of Network Security Devices?In a previous blog, we explored various concepts associated with network security....
-
Understanding Network SecurityCommunication to and from devices essentially happens via networks. That network can...