Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog27 March 2017PetrWrap: Cybercriminals stealing code from one anotherThe latest version of Petya based ransomware is PetrWrap. Petya ransomware has...
-
Blog24 March 2017Finding the appropriate Content Management System(CMS) for your OrganizationIn today’s market, you can find a Content Management System(CMS) at arm’s...
-
Blog20 March 2017Kirk Ransomware: Star trek themed malware!A new piece of ransomware has surfaced featuring star trek theme, named...
-
Blog16 March 2017Addressing the cyber security for your companyThere are multiple facets of cyber threats and so are multiple things...
-
Blog16 March 2017How to select web development company in India?Web has unprecedented increase in traffic. Businesses run from websites with the...
-
Blog9 March 2017Selecting A Cloud Firewall SystemCloud, the ease of use which comes with it and of course...
-
Blog8 March 2017Lawful Implementation of DLP Plan in IndiaData loss prevention (DLP) systems are crucial tools for the safeguards of...
-
Blog3 March 2017New target for hackers this year : Mac OSA second example of Malware targeting Mac OS has surfaced in the...
-
Blog2 March 2017The growing threat of GoldenEye Ransomware AttackThe latest version of Petya ransomware, GoldenEye, is attacking HR department with...
-
Blog27 February 2017Ransomware Spora: Everything you should know about itSpora is the latest ransomware trojan which is highly sophisticated in its...
-
Getting a bonus is always good… unless it’s an advanced Bazar Trojan in disguise
Security researchers have found a deadly variant of a Bazar Trojan that...
-
Hosting Provider Phishing Scam
Cyber criminals will often use scare tactics to prod their victims into...
-
SitePoint Security Breach
SitePoint is an online portal which provides some great tutorials on web...
-
Office365 Email Compromise – SolarWinds Faces Security Breach
SolarWinds, an IT services company, recently faced issue with their email security....
-
Server Hack Costs 1.5 Crore in Losses
Case Specifics A private company based in Pune recently suffered from a...
-
Malwarebytes Hacked by The Same Group Behind SolarWinds Security Breach
Cyber security firm themselves are lucrative targets for hackers. It is a...
-
Blog 2 April 2020 The Google Calendar Spam: Something you need to know? -
Blog 26 March 2020 Multi-Factor Authentication: The Devil Is In The Details -
Blog 23 March 2020 Coronavirus Sparks A Series of Phishing Ruses -
Blog 17 March 2020 Coronavirus Forces Employees to Work From Home. But What About Remote Security? -
Blog 13 March 2020 Microsoft Office 365 and Google G Suite Become Hot Targets for BEC -
Blog 11 March 2020 COVID-19 Sparks A Series of Phishing Attacks
-
The Google Calendar Spam: Something you need to know?Google Calendar Falls Prey to Spammers A rather unique spamming technique has...
-
Multi-Factor Authentication: The Devil Is In The DetailsHackers attacked more than a million Microsoft Accounts ! If you need...
-
Coronavirus Sparks A Series of Phishing RusesCurb your instincts; don’t open emails just because they claim to contain...
-
Coronavirus Forces Employees to Work From Home. But What About Remote Security?Covid-19 Outbreak forcing you to work from home? Here are the best...
-
Microsoft Office 365 and Google G Suite Become Hot Targets for BECFBI Reports Suggest BEC should be treated as seriously as Ransomware For...
-
COVID-19 Sparks A Series of Phishing AttacksCybercriminals exploit the mass epidemic of COVID-19 Times are tough all over...