Increasing cyber attacks calls for increased security audits within IT companies

Increasing cyber attacks calls for increased security measures

Indian IT companies did not give high priority to cyber security but the increased number of cyber attacks have lead them into reconsidering their security. Clients typically had a generalized languages in their cyber security contracts for ensuring their protection from hackers but an exponential increase in cyber attacks have shown more is required. “It […]

Continue reading


Whatsapp to take legal Action against App Misusers and Spammers

Whatsapp to take legal Action against App Misusers and Spammers

Whatsapp has announced that it will take legal action against individual and companies sending bulk messages in violation to its terms and conditions. These days Whatsapp is highly being exploited in circulating fake news and false informationg creating a havoc among the populace. For these reasons the company has been under fire from the Indian […]

Continue reading


India ranks second in cyber attacks with 38 attacks per second

the-rising-and-falling-cyber-security-trends-in-2018.png

India is a country with the second-largest number of account take-over logins – close to 1.38 lakh login’s per hour in 2018 cited by ‘Credential Stuffing: Attacks and Economies’, a 2018 Akamai report. An Account Take Over (ATO) occurs when a stolen login and password combination is used to access multiple accounts using bots. Remember […]

Continue reading


Dark Web Exposes Computer-Server Data Transfer to Hackers

Dark Web Exposes Computer-Server Data Transfer to Hackers

As startling as it may sound but cybercriminals now have access to the most-secured data files used to facilitate confidential communication between organisations’ servers and clients’ computers on the Dark Web. Although Ransomware have been available in the dark web as a service for quite some time now but security certificates is a new phenomena. […]

Continue reading


IMAP is the most exploited protocol. Office 365 and G Suite cloud accounts hacked

IMAP 1

One thing leads to another like a domino, with access to leaked credentials dumps, the speed and efficiency of brute-force attacks has improved significantly. Hackers have been targeting legacy protocols with these stolen credentials dumps. IMAP (Internet Message Access Protocol) is the most abused protocol, IMAP is the protocol that bypasses Multi-Factor Authentication and lock-out […]

Continue reading


Ryuk ransomware Attack on Jackson county fetches hackers a whopping $400,000

Ryuk Ransomware

The entire computer system of Jackson County, Georgia was hit by a massive Ryuk ransomware attack on March 01. Authorities confirmed that the attack has affected all the departments. This ransomware leads to a complete shut down unless the files are recovered using the decryption key. Emails as well as emergency services were affected by […]

Continue reading


Spear phishing is on the rise in 2019

Spear phishing

One of the most dangerous and highly successful type of cyber attacks is spear phishing attacks. This is a highly sophisticated well engineered attack to penetrate into the defense of a targeted victim and has high likelihood of success. The attackers knows enough about the victim to communicate with the victim as an alias and […]

Continue reading


Latest cryptomining malwares uninstalls cloud security software

cryptomining malwares

This is a new bread of malware! A very new malware is seen accomplishing never before seen function – uninstalling cloud security products! This new malware is capable of taking admin rights on targeted system by uninstalling the cloud-security products. Multiple occasions of the malicious activity are tied to coin-mining malware targeting Linux servers.   […]

Continue reading


Web applications: new back-doors to access private data

web browser main

Multiple rogue web applications can be used to attack vulnerable browser extension and exploiting private data becomes easier for adversaries post the access is granted. This is alarming mainly because a normal person browsing the internet is caught unaware of something like this even exists. Various browsers – Chrome, Firefox, Opera extension have been tested […]

Continue reading


Important cybersecurity statistics for 2019

cybersecurity statistics 2019

Digital economy is growing everywhere in the world. Technology is changing our livelihoods in unprecedented ways. We cannot imagine life without internet or without using technology in our day-to-day chores. It has certainly altered the nature’s way of evolution, but it also means that there is a very different kind of warfare happening all the […]

Continue reading