Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog4 May 2018Data hacked during EPFO-Aadhar seedingCyber criminals seem to have hacked the EPFO data which holds information...
-
Blog25 April 2018Smartly defining RPO and RTO for Disaster Recovery PlansRecovery Point Objective (RPO) and Recovery Time Objective (RTO) are 2 most...
-
Blog25 April 2018Formbook Malware spreading widely by clicking Microsoft URL shortcut files in your emailsBe careful when you receive attachments to an email, it can be...
-
Blog25 April 2018CIOs must run a customer centric businessIt is high time for CIOs to run a customer centric business....
-
Blog20 April 2018Indian Government needs to give cyber security an equal priority to border securityDigital India is no more a dream but carving into an absolute...
-
Blog19 April 2018Rarog – A cryptomining Trojan is out in the wildA malware family Rarog is out in the internet and being excessively...
-
Blog17 April 2018Private Cloud vs Public Cloud. Making the perfect choice!Embracing cloud technology is no longer a choice but an inevitable business...
-
Blog16 April 2018Slingshot, an APT Malware making its way through routers in the NetworkAn APT (Advanced Persistent Threat) malware, Slingshot, attacks victims by entering via...
-
Blog14 April 2018Microsoft Office 365 provides new Advanced Security FeaturesMicrosoft Office 365 is widely popular work office suite, among the SMBs....
-
Blog12 April 2018Is blockchain the alchemy to DDoS attacks?DDoS(Denial of Distributed Service) attack is a type of cyber attack that...
-
Omicron phishing attacks already started
Back when Covid-19 had started spreading around the March of 2020, we...
-
TodayZoo phishing kit creates the Franken-phish phishing monster
A bizarre phishing campaign is afoot, using a tool called as a...
-
SBI customers lose money to a novel bank phishing attack
Several customers of the State Bank of India have started filing complaints...
-
Cyber Security Advisory – Apache Log4J Remote Code Execution Vulnerability (CVE-2021-44228
Log4Shell: RCE 0-day exploit found in log4j2, a popular Java logging package....
-
Do your best work with Microsoft 365 Solutions
Microsoft 365 is here to provide the best integrate experience for your...
-
Russian threat group after 14,000 Gmail accounts
A Russian-linked hacker group, APT28, purported to have been on a month-long...
-
Blog 16 March 2021 SitePoint Security Breach -
Blog 15 March 2021 Office365 Email Compromise – SolarWinds Faces Security Breach -
Blog 12 March 2021 Server Hack Costs 1.5 Crore in Losses -
Blog 9 March 2021 Malwarebytes Hacked by The Same Group Behind SolarWinds Security Breach -
Blog 5 March 2021 Common Cyber Attacks You Should Know -
Blog 25 February 2021 Haryana Hackers Steal INR 1 Crore
-
SitePoint Security BreachSitePoint is an online portal which provides some great tutorials on web...
-
Office365 Email Compromise – SolarWinds Faces Security BreachSolarWinds, an IT services company, recently faced issue with their email security....
-
Server Hack Costs 1.5 Crore in LossesCase Specifics A private company based in Pune recently suffered from a...
-
Malwarebytes Hacked by The Same Group Behind SolarWinds Security BreachCyber security firm themselves are lucrative targets for hackers. It is a...
-
Common Cyber Attacks You Should KnowIt is true that most common cyber attacks leverage gaps in technical...
-
Haryana Hackers Steal INR 1 CroreHaryana hackers defrauded ISGEC Heavy Engineering company and nicked an amount of...