Spear phishing is on the rise in 2019

Spear phishing

One of the most dangerous and highly successful type of cyber attacks is spear phishing attacks. This is a highly sophisticated well engineered attack to penetrate into the defense of a targeted victim and has high likelihood of success. The attackers knows enough about the victim to communicate with the victim as an alias and […]

Continue reading


Latest cryptomining malwares uninstalls cloud security software

cryptomining malwares

This is a new bread of malware! A very new malware is seen accomplishing never before seen function – uninstalling cloud security products! This new malware is capable of taking admin rights on targeted system by uninstalling the cloud-security products. Multiple occasions of the malicious activity are tied to coin-mining malware targeting Linux servers.   […]

Continue reading


Web applications: new back-doors to access private data

web browser main

Multiple rogue web applications can be used to attack vulnerable browser extension and exploiting private data becomes easier for adversaries post the access is granted. This is alarming mainly because a normal person browsing the internet is caught unaware of something like this even exists. Various browsers – Chrome, Firefox, Opera extension have been tested […]

Continue reading


Important cybersecurity statistics for 2019

cybersecurity statistics 2019

Digital economy is growing everywhere in the world. Technology is changing our livelihoods in unprecedented ways. We cannot imagine life without internet or without using technology in our day-to-day chores. It has certainly altered the nature’s way of evolution, but it also means that there is a very different kind of warfare happening all the […]

Continue reading


Economic Impact of DMARC for companies across the globe

Economic Impact of DMARC for companies

What is DMARC? DMARC is a security standard which allows a domain to declare a policy of how it wants email processors to examine and treat emails claiming to be from that declaring domain. The core policies are “none” (do nothing special, and optionally report), or “quarantine” or “reject” messages which fail various other security […]

Continue reading


Latest DNS Spoofing attacks use fragmented datagrams. Can you avoid it?

dns spoofing using fragmented datagrams

With a little attention, as it turns out, one can spoof fake DNS responses using fragmented datagrams. How is it done? To match authentic DNS responses to their corresponding queries, resolvers and operating system check: Name of the query Type of the query Source/destination address Destination port (16 bits) DNS transaction ID (16 bits) The […]

Continue reading


Prevent the Fileless Attacks for your Windows PC

fileless attack

What is a Fileless or non-malware attack A non-malware attack is one in which an attacker uses existing software, allowed applications and authorized protocols to carry out malicious activities. Non-malware attacks are capable of gaining control of computers without downloading any malicious files, hence the name. Non-malware attacks are also referred to as fileless, memory-based […]

Continue reading


Ransomware Action Plan for Indian Businesses

Indian businesses

Sometime in May last year the world woke up to the menace Ransomware can cause. Corporations were caught unaware of something as dangerous as ransomware could strike them and rake up millions of dollars in damages at multiple levels. There is no question vulnerabilities remain given the penetration of different technologies in our lives and […]

Continue reading