Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Blog28 August 2019Ransomware: An insidious, evolving ThreatRansomware is considered one of the most dangerous threats to organizations across...
-
Blog23 August 2019Microsoft warns Users of phishing attacks using custom 404 PagesMicrosoft Security researchers discovered an unusual phishing campaign replicating their Microsoft login...
-
Blog21 August 2019India’s IoT Deployments suffered 22% more cyberattacks in Q2IoT deployments in India received the maximum number of attacks from a...
-
Blog21 August 2019Whale Phishing has risen to be a major cyber security threatA whale phishing attack is a specific type of phishing attack that targets high-profile...
-
Blog14 August 2019Top 3 cybersecurity threats of 2019Cybersecurity has risen ever higher up the corporate agenda for the very...
-
Blog9 August 2019Coping up with evolving priorities and challenges of CISOsWith the increasing cybersecurity attacks the role of CISOs have evolved drastically...
-
Blog6 August 2019FlawedAmmyy RAT Malware Attacks even patched windows Users, Beware!Always be cautious while opening email attachments. Recently, hackers have been sending...
-
Blog2 August 2019Visa Contactless cards are prone to big fraudsHackers have found new ways to bypass the payment limits on Visa contactless...
-
Blog31 July 2019Make your employees your Strongest link in Cyber SecurityYour company may be using the latest software, hardware and other resources...
-
Blog26 July 2019American Express customers targeted by Novel Phishing AttackAmerican Express customers were targeted with a Novel Phishing attack for stealing...
-
Your Guide to Choosing a Network Firewall
Firewall options and deployments are very flexible. They can be configured as...
-
Oil India HQ Gets Ransom Demand of Rs 60 Crore
The registered headquarters of Oil India Limited (OIL) at Duliajan in Assam...
-
Securing hybrid IT environments
When cloud technologies had first emerged, several businesses had jumped on the...
-
Logix Offers Multiple Upgrade Options for Office 365 Kiosk / F1 Plan Users
Microsoft recently disabled support for POP / IMAP for its Office 365...
-
Microsoft Shuts Down Exchange Online Basic Authentication Services
As cyber-attacks continue targeting remote workers and hybrid environments, Microsoft is taking...
-
Deprecation of Microsoft Basic Authentication for Exchange Online
Until recently, the industry has relied on basic authentication as a security...
-
Blog 15 December 2021 TodayZoo phishing kit creates the Franken-phish phishing monster -
Blog 13 December 2021 SBI customers lose money to a novel bank phishing attack -
Blog 8 December 2021 Do your best work with Microsoft 365 Solutions -
Blog 3 December 2021 Russian threat group after 14,000 Gmail accounts -
Blog 2 December 2021 The 7 worst data breaches of 2021 -
Blog 26 November 2021 Ransomware trends in 2021
-
TodayZoo phishing kit creates the Franken-phish phishing monsterA bizarre phishing campaign is afoot, using a tool called as a...
-
SBI customers lose money to a novel bank phishing attackSeveral customers of the State Bank of India have started filing complaints...
-
Do your best work with Microsoft 365 SolutionsMicrosoft 365 is here to provide the best integrate experience for your...
-
Russian threat group after 14,000 Gmail accountsA Russian-linked hacker group, APT28, purported to have been on a month-long...
-
The 7 worst data breaches of 2021Because every business is now online, it generates plenty more data than...
-
Ransomware trends in 2021Ransomware attacks have been on a steady rise in 2021, both in number of ransomware attacks and also...