Use your own Data wisely to detect an attack!

data

Perennial, for a problem to exist that cyber-criminals areahead of security measures deployed. Your own data can be used effectively to hit the achilleas heel of the attacker.  Since the sophistication grows with time so must the traditional methods of security. Threat detection systems based on signatures, file checksums or blacklisted URLs are all passé. […]

Continue reading


Cyber threats may wreak Havoc by 2020

2020

India will face increasingly sophisticated “destructive” cyber threats as compared to the current scenario which is adding up to 200 million, malware related and 1,90,000 unique, intrusion related attacks in any given week. Gulshan Rai Indian cyber security chief briefed the Parliament’s finance standing committee that the cyber-attacks of nuisance and viruses of 2000’s have […]

Continue reading


Securing your email and network requires a paradigm shift in Mindset

cyber security

Nearly every day a successful digital breach is reported. Major organizations, government bodies, hospitals, companies, public offices have been victims of massive-sophisticated attacks all over the world. Last decade the pace of digitization and technology building has been tremendous and the coming decades promise even more high-end technology in day-to-day activities. Given that resources aren’t […]

Continue reading


Increase Threat Hunting beyond ATP Tools

atp

ATP tools are the core of most of the cyber-crime fighting software’s. Today, we have a generation of products from vendors promising state-of-art detection using machine learning, neural networks, and threat intelligence. With all the promises of safe keeping and the demo where the installed system detects and blocks the malicious stuff- we still have […]

Continue reading


Do you know, if there is an intruder in your network!

intruder

You need to believe that you are being compromised before you start helping your organization stay secure. Intruders can very well lay low in the company’s network for weeks or months before they would actually cause any damage. Let us take you through a situation- Via the system of marketing head of you company an […]

Continue reading


Current Cyber-heist- Not just personal or corporate!

cyber heist

Yes, you read that right. Cyber criminals are not just after your personal or corporate data of the companies but something much bigger. No doubt, personal or corporate data including health, financial data has many takers on the market of if not, the companies can be kept hostage for ransom. For some companies, however there […]

Continue reading


Website leaks data of 120 million Reliance Jio users, Telco claims data is safe?

data leaks

This could be the biggest data breach in India. The data is supposedly leaked on a website called magicapk. The leaked details include sensitive user information such as- Name, Jio number, the region from where the sim has been activated, email id and even Aadhar number has been exposed. Magicapk showed the user information in […]

Continue reading


5 ways to monitor DNS traffic for security threats

dns

Monitoring DNS traffic can reveal a lot about Botnets on your network. Botnet-assisted Distributed denial of service (DDoS) attacks are one of the most common forms of network abuse. Sometime back a botnet called Mirai got the entire American internet to standstill when it infiltrated the servers ofDyn- a company which controls much of internet’s […]

Continue reading


Cyber Security Lessons to learn from the latest RNC Data Leak

data leaks

Important lessons are learned the hard way. Republican National Committee (RNC) hired Deep Root Analytics, a data analytics firm to profile voters and they left sensitive- 9.2 billion data point amounting to information of nearly 200 million American citizens on an unsecured web server. A poorly configured amazon S3 bucket that could have led to […]

Continue reading