Hosting Provider Phishing Scam Cyber criminals will often use scare tactics to prod their victims into interacting with their phishing links and malicious programs. […] Read more
What is Cloud Security & Why Do You Need A Cloud Firewall? The advent of cloud computing gave rise to hyper connectivity and constant availability. Data could not only be stored on […] Read more
SitePoint Security Breach SitePoint is an online portal which provides some great tutorials on web development. It recently went through a security breach […] Read more
Office365 Email Compromise – SolarWinds Faces Security Breach SolarWinds, an IT services company, recently faced issue with their email security. Sudhakar Ramakrishna, CEO SolarWinds, suspects a zero-day vulnerability […] Read more
Server Hack Costs 1.5 Crore in Losses Case Specifics A private company based in Pune recently suffered from a server hack. The hackers, who remain as of […] Read more
Malwarebytes Hacked by The Same Group Behind SolarWinds Security Breach Cyber security firm themselves are lucrative targets for hackers. It is a matter of pride for them; their way of […] Read more
Common Cyber Attacks You Should Know It is true that most common cyber attacks leverage gaps in technical devices or technological aspects a business uses, to […] Read more
Haryana Hackers Steal INR 1 Crore Haryana hackers defrauded ISGEC Heavy Engineering company and nicked an amount of INR 1.05 crore. These hackers intruded upon ISGEC’s […] Read more
Microsoft Fails to Block O365 Email Spoofing Attacks Microsoft is under the gun again for cyber fraud. 200 million+ users are at a risk of O365 email spoofing […] Read more
What are the types of Network Security Devices? In a previous blog, we explored various concepts associated with network security. If you haven’t already, we highly recommend reading […] Read more