Beware – A Phishing Attack through IT Refund Message Smishing, a variant of phishing, attacks through SMS usually target individuals or organizations, it imitates an identity of a legal […] Read more
Fake voicemail notifications targetting credentials Fake voicemail notifications aid scammers to collect Office 365 login credentials Heard of phishing attacks? There’s been an update! They […] Read more
Phishing goes beyond email While phishing expands its horizons, should your security? Expanding its customer base is one of the key strategies that a […] Read more
The Dangers of Identity Theft Identity Theft – what and how to stay safe? With cloud storages and online platforms growing stronger by the day, […] Read more
Third Party VPN services under threat of attack by the infamous APT5 Team VPN Compromised — Are you Safe? State sponsored hacking has been around for ages. It occurs when a nation’s government […] Read more
Checkpoint Security reports a shocking rise in Sextortion Emails There’re no lines cybercriminals won’t cross. Now they’ve resorted to sextortion! Malware was always a poisoned bit of coding A […] Read more
FakeNarrator Malware launches an all-out attack in the South-East Asian region Beware of FakeNarrator Malware Accessibility and Productivity play a key role in ensuring smooth functioning of any organization. Any service […] Read more
NCSAM – Where Industries and the Government team up to raise Cybersecurity Awareness It’s National Cybersecurity Awareness Month NCSAM is an internationally acclaimed awareness drive celebrated to promote the growing importance of cybersecurity […] Read more
The ABCs of Malware – An informative Blog Series (Part 3 of 3) All About Malware – Safeguarding Against Malware This is Part Three of the Three Part Series of Malware Blogs. Till […] Read more
The ABCs of Malware – An informative Blog Series (Part 2 of 3) All About Malware – Types of Malware This is Part Two of the Three Part Series of Malware Blogs. A short recap of […] Read more