Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog15 June 2017How to select best email archiving solution for your company?A very important task is selecting an e-mail archiving product. Since archiving...
-
Blog12 June 2017Why do companies need Sandboxing?A sandbox gives you a chance to look into the future. It...
-
Blog5 June 2017Chinese Fireball Malware affects 250 Mn computers. India most affected.Possibly the largest malware infection operation in the history is on its...
-
Blog19 May 2017UIWIX Ransomware. The threat of WannaCry is not over yet.The evolved version of Wannacry ransomware; UIWIX Ransomware continues to shock the...
-
Blog17 May 2017WannaCry Ransomware: How it affected India? What could be done to keep safe? What is next?The Ransomware that shock the world started on 12th May as a...
-
Blog15 May 2017The latest global cyberattack – Wannacry Ransomware.On May 12th 2017, a ransomware of WannaCry or Wcry started spreading...
-
Blog2 May 2017Received a new job offer? Beware- Genuine or Fake?Scammers are on the rise with more and more fictitious job offers...
-
Blog28 April 2017Which is the best choice for your organization- Shared or Dedicated web hosting?Running a mid-sized business; choosing between a shared and dedicated web hosting...
-
Blog10 April 2017Why do companies need responsive web design?Responsive web design is an approach to creating web sites which can...
-
Blog10 April 2017Matrix Ransomware: Spreading to PCs through Malicious ShortcutsThe latest addition to the growing threat of ransomware is the Matrix...
-
Microsoft Email Users Fall Prey to FedEx Phishing Emails
Microsoft email users seem to be repeatedly be targeted by one phishing...
-
Celsius Data Breach – Phishing Claims More Victims
Celsius, a crypto lending service, recently learned of a security break at...
-
Ransomware Attack At Realty Firm– Possible Data Loss
A realty firm called Ansal Housing recently fell prey to a ransomware...
-
Banking Customers Fall Prey to Phishing Scams
Sensitive banking information is always a matter of great anxiety for us...
-
Exchange Email Hack
The Rampage Continues Vulnerabilities in a major player’s server architecture is an...
-
Growing Concerns of Credential Theft Cases
Deep research into cyber security threat patterns has revealed some trends in...
-
Blog 4 May 2020 10 Steps For Ransomware Protection -
Blog 2 May 2020 Cyber Cell Recovers Rs 65 Lakhs Lost To Invoice Fraud -
Blog 30 April 2020 Delhi Police Imitated For Phishing Campaigns -
Blog 24 April 2020 Fake Invoices: How is the Emotet Botnet Attacking Financial Sectors? -
Blog 22 April 2020 Ransomware Strains In the News Again -
Blog 20 April 2020 Operation TA542
-
10 Steps For Ransomware ProtectionIt is uncanny, the resemblance of a ransomware’s working to the ongoing...
-
Cyber Cell Recovers Rs 65 Lakhs Lost To Invoice FraudCyber Cell Recovers 65 lakhs Lost To Invoice Fraud With all the...
-
Delhi Police Imitated For Phishing CampaignsThe Enforcer Becomes the Victim It is a mark of shameful arrogance...
-
Fake Invoices: How is the Emotet Botnet Attacking Financial Sectors?The Emotet Botnet Continues Its Rampage By Spreading Fake Invoices This is...
-
Ransomware Strains In the News AgainTalos Incident Response Talks About New Ransomware Strains In a previous blog,...
-
Operation TA542Operation TA542: Emotet Resurfaces This botnet has been ping-ponging back and forth,...