Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Ukraine Targeted by a Russian APT Hacker Team
Russian APT Hacker Team Strikes Out The Military and the Government are...
-
Defence Ministry Targeted For Phishing
Warning Issued for Defence Personnel The defence ministry has issued an emergency...
-
Celebrating 20 Glorious Years of Logix…
We cherish this journey of 20 years which started with a very humble...
-
Most Likely Phishing Targets
Organizations Most at Risk of Phishing Phishing is a rapidly damaging cybercrime...
-
Corporate Email Hijacking
Corporate Email Hijacking: Know how it’s done Businesses contribute heavily to the...
-
Protection Against Online Scams
Guidelines to protect yourself against cyber-scamming Digitisation has seeped into virtually all...
-
Blog 14 December 2018 Concerns of SMBs on DMARC -
Blog 10 December 2018 Half of the Phishing sites trick users by displaying the green padlock! -
Blog 28 November 2018 Business e-mail compromise (BEC), the new service which has takers! -
Blog 25 November 2018 Increasing Phishing attacks in India -
Blog 22 November 2018 Latest DNS Spoofing attacks use fragmented datagrams. Can you avoid it? -
Blog 15 November 2018 Prevent the Fileless Attacks for your Windows PC
-
Concerns of SMBs on DMARCDMARC (domain-based message authentication, reporting and conformance) has been gaining traction over...
-
Half of the Phishing sites trick users by displaying the green padlock!Phishing has always been hackers favorite act. It allows them to make...
-
Business e-mail compromise (BEC), the new service which has takers!For as low as $150 you can get the credentials for an...
-
-
Latest DNS Spoofing attacks use fragmented datagrams. Can you avoid it?With a little attention, as it turns out, one can spoof fake...
-
Prevent the Fileless Attacks for your Windows PCWhat is a Fileless or non-malware attack A non-malware attack is one...