5 Social Engineering Attacks You Should Know This is Part Two of our 3-part series on Social Engineering. In this blog, we discuss 5 social engineering attacks you […] Read more
What Is Social Engineering? When it comes to cyber-attacks, our thoughts jump immediately to malicious code and the misuse of technology. However, the success […] Read more
Your Office 365 Credentials Are Vulnerable To This MS Teams Phishing Attack It is time you should probably review the safety of your Office 365 credentials. Recently, Microsoft Teams was targeted for […] Read more
This Pharma Lab Data Breach Caused Multiple Plants to Shut Down A successful data breach at Dr Reddy’s, a well-known pharmaceutical company, caused a total shutdown of multiple laboratories and plants. […] Read more
These two companies are favourites for spoofed emails A quarterly report for cyber statistics has stated that two companies in particular have become go-to targets for spoofed emails. […] Read more
Business Email Compromise: A Complete Guide Email has become an inseparable part of any business. Sending invoices, making major decisions, updating your clients, scheduling meetings… all […] Read more
Why Web Application Firewall Is a Must In Your Security Arsenal If your organization is cyber aware, you doubtless have procured some services and tools for your network security. As more […] Read more
Credentials Theft: A Case Study Cyber criminals keep creatively upping their game and this new phishing attack is proof of that. A new worm phishing […] Read more
Major Data Breach of Government Computers The National Informatics Center (NIC) and the Ministy of Electronics & Information Technology (MeitY) suffered a data breach in early […] Read more
Look out for Covid-19 Related Cyber Scams While regulations have lifted the restrictions of strict lockdowns, common sense and the growing number of Covid-19 cases suggest otherwise. […] Read more