Do you know, if there is an intruder in your network!

intruder

You need to believe that you are being compromised before you start helping your organization stay secure. Intruders can very well lay low in the company’s network for weeks or months before they would actually cause any damage. Let us take you through a situation- Via the system of marketing head of you company an […]

Continue reading


Current Cyber-heist- Not just personal or corporate!

cyber heist

Yes, you read that right. Cyber criminals are not just after your personal or corporate data of the companies but something much bigger. No doubt, personal or corporate data including health, financial data has many takers on the market of if not, the companies can be kept hostage for ransom. For some companies, however there […]

Continue reading


Website leaks data of 120 million Reliance Jio users, Telco claims data is safe?

data leaks

This could be the biggest data breach in India. The data is supposedly leaked on a website called magicapk. The leaked details include sensitive user information such as- Name, Jio number, the region from where the sim has been activated, email id and even Aadhar number has been exposed. Magicapk showed the user information in […]

Continue reading


5 ways to monitor DNS traffic for security threats

dns

Monitoring DNS traffic can reveal a lot about Botnets on your network. Botnet-assisted Distributed denial of service (DDoS) attacks are one of the most common forms of network abuse. Sometime back a botnet called Mirai got the entire American internet to standstill when it infiltrated the servers ofDyn- a company which controls much of internet’s […]

Continue reading


SMBv1- a very old protocol causing Wanna-Cry: should it be disabled?

smbv1

SMBv1 isn’t safe and what-so-ever update you run or patch you update the problem is- you are still running SMB1. Hackers behind WannaCry ransomware infected servers with vulnerable SMB ports before victimizing them with phishing emails. The original SMB1 protocol is 30 years old and it was designed for the 80’s world, a world without […]

Continue reading


Steps to stop targeted and advanced threats

advanced threats

Targeted attacks reap big rewards. Large organizations and institutions have faced a sophisticated attacks and millions of customer data has been affected. Not only it causes financial losses but tarnishes the reputation. When does an attack become targeted attack? There are few specific details for an attack to be called targeted: When the attackers have […]

Continue reading


4 things you must know about Cyber Security in the era of IoT

Security in the era of IoT

Cyber Security in the era of Internet-of-things is a changing paradigm. According to recent study by Gartner, more than half of major new business processes and systems will include an IoT component by 2020. Cisco speculates that more than 50 billion connected devices will exist by 2020 which will definitely make our lives easier in […]

Continue reading


UIWIX Ransomware. The threat of WannaCry is not over yet.

Ransomware UIWIX

The evolved version of Wannacry ransomware; UIWIX Ransomware continues to shock the world. WannaCry Ransomware began spreading on May 12th but was accidentally stopped by a kill switch triggered by a MalwareTech researcher. However, it looks like the kill switch did not completely stop the spread rather slowed the speed. Hackers have since then updated […]

Continue reading