Cryptojacking Attack hits Aditya Birla Group A big cryptojacking attack took place first time in the country last month. The target was the Aditya Birla Group […] Read more
ODNS would be an internet security breakthrough The DNS is essentially a phonebook for the Internet’s domain names. When any device makes the first request over the […] Read more
Cyber criminals have discovered a new way to bypass Office 365 Safe Links Microsoft’s Advanced Threat Protection (ATP) includes a feature called Safe Links. Office 365 Safe Links basically curb all the malicious […] Read more
Data hacked during EPFO-Aadhar seeding Cyber criminals seem to have hacked the EPFO data which holds information like name, Aadhar card number, bank details of […] Read more
Smartly defining RPO and RTO for Disaster Recovery Plans Recovery Point Objective (RPO) and Recovery Time Objective (RTO) are 2 most important parameters for a disaster recovery and business […] Read more
Formbook Malware spreading widely by clicking Microsoft URL shortcut files in your emails Be careful when you receive attachments to an email, it can be an entry point to Formbook Malware. Formbook malware […] Read more
CIOs must run a customer centric business It is high time for CIOs to run a customer centric business. In today’s world, where there are so many […] Read more
Indian Government needs to give cyber security an equal priority to border security Digital India is no more a dream but carving into an absolute reality. The steps taken by the government to […] Read more
Rarog – A cryptomining Trojan is out in the wild A malware family Rarog is out in the internet and being excessively used by the cyber criminals to execute cryptocurrency […] Read more
Private Cloud vs Public Cloud. Making the perfect choice! Embracing cloud technology is no longer a choice but an inevitable business move. However migrating to cloud is not an […] Read more