Use your own Data wisely to detect an attack!

data

Share this:    Perennial, for a problem to exist that cyber-criminals areahead of security measures deployed. Your own data can be used effectively to hit the achilleas heel of the attacker.  Since the sophistication grows with time so must the traditional methods of security. Threat detection systems based on signatures, file checksums or blacklisted URLs are all […]

Continue reading


Cyber threats may wreak Havoc by 2020

2020

Share this:    India will face increasingly sophisticated “destructive” cyber threats as compared to the current scenario which is adding up to 200 million, malware related and 1,90,000 unique, intrusion related attacks in any given week. Gulshan Rai Indian cyber security chief briefed the Parliament’s finance standing committee that the cyber-attacks of nuisance and viruses of 2000’s […]

Continue reading


Securing your email and network requires a paradigm shift in Mindset

cyber security

Share this:    Nearly every day a successful digital breach is reported. Major organizations, government bodies, hospitals, companies, public offices have been victims of massive-sophisticated attacks all over the world. Last decade the pace of digitization and technology building has been tremendous and the coming decades promise even more high-end technology in day-to-day activities. Given that resources […]

Continue reading


Increase Threat Hunting beyond ATP Tools

atp

Share this:    ATP tools are the core of most of the cyber-crime fighting software’s. Today, we have a generation of products from vendors promising state-of-art detection using machine learning, neural networks, and threat intelligence. With all the promises of safe keeping and the demo where the installed system detects and blocks the malicious stuff- we still […]

Continue reading


Do you know, if there is an intruder in your network!

intruder

Share this:    You need to believe that you are being compromised before you start helping your organization stay secure. Intruders can very well lay low in the company’s network for weeks or months before they would actually cause any damage. Let us take you through a situation- Via the system of marketing head of you company […]

Continue reading


Current Cyber-heist- Not just personal or corporate!

cyber heist

Share this:    Yes, you read that right. Cyber criminals are not just after your personal or corporate data of the companies but something much bigger. No doubt, personal or corporate data including health, financial data has many takers on the market of if not, the companies can be kept hostage for ransom. For some companies, however […]

Continue reading


Website leaks data of 120 million Reliance Jio users, Telco claims data is safe?

data leaks

Share this:    This could be the biggest data breach in India. The data is supposedly leaked on a website called magicapk. The leaked details include sensitive user information such as- Name, Jio number, the region from where the sim has been activated, email id and even Aadhar number has been exposed. Magicapk showed the user information […]

Continue reading


5 ways to monitor DNS traffic for security threats

dns

Share this:    Monitoring DNS traffic can reveal a lot about Botnets on your network. Botnet-assisted Distributed denial of service (DDoS) attacks are one of the most common forms of network abuse. Sometime back a botnet called Mirai got the entire American internet to standstill when it infiltrated the servers ofDyn- a company which controls much of […]

Continue reading


Cyber Security Lessons to learn from the latest RNC Data Leak

data leaks

Share this:    Important lessons are learned the hard way. Republican National Committee (RNC) hired Deep Root Analytics, a data analytics firm to profile voters and they left sensitive- 9.2 billion data point amounting to information of nearly 200 million American citizens on an unsecured web server. A poorly configured amazon S3 bucket that could have led […]

Continue reading