Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog3 June 2018How to differentiate rogue URLs from the authentic onesHow can you identify if the domain is authentic or impostor? The...
-
Blog31 May 2018Why Blockchain may not be the elixir to internet securityEvery architect, builder and designer knows that the right tool can solve...
-
Blog27 May 2018Top 3 cyber security concepts for 2018Cyber security is taking a new turn every year. Its very crucial...
-
Blog26 May 2018Maintaining Control is vital to Data ProtectionIt is of prime importance to any organization to identify sensitive information...
-
Blog23 May 2018Beware of Fake Email IDsA lot of scams are happening via fake email IDs. Whether you...
-
Blog19 May 2018Cyber Security challenges for CXOTechnology is evolving rapidly and so are the cyber risks. It is...
-
Blog17 May 2018Internet Explorer Zero-day “Double-kill”A remote code execution vulnerability exists in the way that the VBScript...
-
Blog15 May 2018Cryptojacking Attack hits Aditya Birla GroupA big cryptojacking attack took place first time in the country last...
-
Blog11 May 2018ODNS would be an internet security breakthroughThe DNS is essentially a phonebook for the Internet’s domain names. When...
-
Blog11 May 2018Cyber criminals have discovered a new way to bypass Office 365 Safe LinksMicrosoft’s Advanced Threat Protection (ATP) includes a feature called Safe Links. Office...
-
The biggest internet scams – and how to stop them
Phishing is a popular internet scam that has been claiming victims by...
-
New Emotet campaigns disrupting mailboxes
The Emotet malware seems to be back from its 10-month vacation. Mid...
-
Official FBI email servers hacked
An unidentified hacker group managed to get official FBI email servers hacked,...
-
KYC registration agency gets vulnerability alert
An independent team of security researchers have identified a vulnerability in the...
-
Cyber incident highlights of 2021
Preparing for a secure 2022 We walk down memory lane today to...
-
India’s biggest demat depository breached
Central Depository Services Ltd. (CDSL), a security firm liaised with the Bombay...
-
Blog 20 April 2021 4 New Hacker Groups Target Microsoft Email Servers -
Blog 14 April 2021 Microsoft Exchange Server Flaws Affect 30,000 Companies -
Blog 6 April 2021 Hackers Target Government Officials Through Rogue Email ID -
Blog 2 April 2021 Getting a bonus is always good… unless it’s an advanced Bazar Trojan in disguise -
Blog 30 March 2021 Hosting Provider Phishing Scam -
Blog 19 March 2021 What is Cloud Security & Why Do You Need A Cloud Firewall?
-
4 New Hacker Groups Target Microsoft Email ServersAfter the focused attacks on Microsoft email servers by alleged state-sponsored hacking...
-
Microsoft Exchange Server Flaws Affect 30,000 CompaniesA slow-burn cyber breach has been transpiring since January, only recently coming...
-
Hackers Target Government Officials Through Rogue Email IDSeveral officials in the government were targeted for phishing through a rogue...
-
Getting a bonus is always good… unless it’s an advanced Bazar Trojan in disguiseSecurity researchers have found a deadly variant of a Bazar Trojan that...
-
Hosting Provider Phishing ScamCyber criminals will often use scare tactics to prod their victims into...
-
What is Cloud Security & Why Do You Need A Cloud Firewall?The advent of cloud computing gave rise to hyper connectivity and constant...