Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Whatsapp to take legal Action against App Misusers and Spammers
Whatsapp has announced that it will take legal action against individual and...
-
Increasing Abused Emails – How bad is it for your company’s brand repute
On an average 75 % of the bulk emails reach the Inbox...
-
Defending the New Generation phishing attacks
Social engineering is an attack vector that relies heavily on human interaction...
-
Are we still lagging behind the attack vendors? Stack Overflow and Canva attacked by hackers!
Last month, 2 major data breaches took place showing how companies are...
-
Andheri Advertisement firm looses 12 lakh INR to cyber criminals
An advertising company in Andheri was cheated of Rs.12 Lakh in a...
-
Office 365 users combat targeted phishing attacks better with Cisco’s Email Security
Microsoft Office 365 has become the most widely used e-mail service in...
-
Blog 17 May 2018 Internet Explorer Zero-day “Double-kill” -
Blog 15 May 2018 Cryptojacking Attack hits Aditya Birla Group -
Blog 11 May 2018 ODNS would be an internet security breakthrough -
Blog 11 May 2018 Cyber criminals have discovered a new way to bypass Office 365 Safe Links -
Blog 4 May 2018 Data hacked during EPFO-Aadhar seeding -
Blog 25 April 2018 Smartly defining RPO and RTO for Disaster Recovery Plans
-
Internet Explorer Zero-day “Double-kill”A remote code execution vulnerability exists in the way that the VBScript...
-
Cryptojacking Attack hits Aditya Birla GroupA big cryptojacking attack took place first time in the country last...
-
ODNS would be an internet security breakthroughThe DNS is essentially a phonebook for the Internet’s domain names. When...
-
Cyber criminals have discovered a new way to bypass Office 365 Safe LinksMicrosoft’s Advanced Threat Protection (ATP) includes a feature called Safe Links. Office...
-
Data hacked during EPFO-Aadhar seedingCyber criminals seem to have hacked the EPFO data which holds information...
-
Smartly defining RPO and RTO for Disaster Recovery PlansRecovery Point Objective (RPO) and Recovery Time Objective (RTO) are 2 most...