Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog11 July 2018Is implementing DMARC a cake walk or a tedious job?It is a cliché in IT industry for people to judge software...
-
Blog7 July 2018FlawedAmmyy RAT being delivered via TA505 email spam campaignsAlways be cautious while opening email attachments. Recently, hackers have been sending...
-
Blog3 July 2018Emotet Malware spreading extensively via Microsoft Documents in emailsHackers are trying to deliver Emotet malware by attaching it to Microsoft...
-
Blog30 June 2018Cloud Technology has brought in a paradigm shift in Storing DataCloud Computing has flourished enormously over the past few years. It has...
-
Blog27 June 2018Indian BFSI Sector needs to be prepared for upcoming data protection lawsThe increase in financial crimes is not only a threat to BFSI...
-
Blog17 June 2018What is DMARC? Why is it important for your business?What is DMARC? DMARC (Domain-based Message Authentication, Reporting and Conformance) is a...
-
Blog15 June 2018Bypass glitch makes Mac OS vulnerable due to improper code-signing implementationA bypass found in third party developers’ interpretation of code signing API...
-
Blog13 June 2018Beware of this Top 10 most misused DomainsIn the latest research it is revealed that, some of the latest...
-
Blog6 June 2018Stay protected from Domain Spoofing – Know all about it!What is spoofing? Cyber criminal can easily impersonate or forges domains, IP...
-
Proofpoint Phishing Attack Harvests Email Logins
In a recent Proofpoint phishing attack, email logins for Microsoft and Google...
-
Secure Microsoft 365 Email with Cisco Cloud Mailbox Defense
In this blog, we are going over ways you can improve your...
-
Ukraine faces cyber trouble – Ukrainian bank and State websites hit
Global situations with respect to Ukraine are dire. But along with geopolitical...
-
Corporate email server breach – activities of Squirrelwaffle
An email server breach at Microsoft’s Exchange servers was detected by a...
-
A phishing attack through spoofed Amazon orders
This phishing attack takes brand impersonation to the next level. Not only...
-
Statistics to prepare you for cybersecurity in 2022
Everyone was just waiting for the calendar to turn on 31st December...
-
Blog 20 May 2021 Ransomware Attack At Realty Firm– Possible Data Loss -
Blog 12 May 2021 Banking Customers Fall Prey to Phishing Scams -
Blog 10 May 2021 Exchange Email Hack -
Blog 29 April 2021 Growing Concerns of Credential Theft Cases -
Blog 26 April 2021 What is an SSL Certificate and why is it important? -
Blog 22 April 2021 EU Banking Regulator Victimized by Microsoft Email Hack
-
Ransomware Attack At Realty Firm– Possible Data LossA realty firm called Ansal Housing recently fell prey to a ransomware...
-
Banking Customers Fall Prey to Phishing ScamsSensitive banking information is always a matter of great anxiety for us...
-
Exchange Email HackThe Rampage Continues Vulnerabilities in a major player’s server architecture is an...
-
Growing Concerns of Credential Theft CasesDeep research into cyber security threat patterns has revealed some trends in...
-
What is an SSL Certificate and why is it important?Why worry about an SSL Certificate? There are a lot of little...
-
EU Banking Regulator Victimized by Microsoft Email HackMajor Financial Institution Compromised The European Banking Authority, one of the foremost...