Cyber Security challenges for CXO Technology is evolving rapidly and so are the cyber risks. It is a big responsibility on the shoulders of CXO […] Read more
Internet Explorer Zero-day “Double-kill” A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could […] Read more
Cryptojacking Attack hits Aditya Birla Group A big cryptojacking attack took place first time in the country last month. The target was the Aditya Birla Group […] Read more
ODNS would be an internet security breakthrough The DNS is essentially a phonebook for the Internet’s domain names. When any device makes the first request over the […] Read more
Cyber criminals have discovered a new way to bypass Office 365 Safe Links Microsoft’s Advanced Threat Protection (ATP) includes a feature called Safe Links. Office 365 Safe Links basically curb all the malicious […] Read more
Data hacked during EPFO-Aadhar seeding Cyber criminals seem to have hacked the EPFO data which holds information like name, Aadhar card number, bank details of […] Read more
Smartly defining RPO and RTO for Disaster Recovery Plans Recovery Point Objective (RPO) and Recovery Time Objective (RTO) are 2 most important parameters for a disaster recovery and business […] Read more
Formbook Malware spreading widely by clicking Microsoft URL shortcut files in your emails Be careful when you receive attachments to an email, it can be an entry point to Formbook Malware. Formbook malware […] Read more
CIOs must run a customer centric business It is high time for CIOs to run a customer centric business. In today’s world, where there are so many […] Read more
Indian Government needs to give cyber security an equal priority to border security Digital India is no more a dream but carving into an absolute reality. The steps taken by the government to […] Read more