Imperva Hacked

Cyber Threats

Imperva Hacked: API Keys, SSL Certificates Stolen Based in California, USA, Imperva offers Cybersecurity software and services designed to protect enterprise data, detect and block malicious attacks and other web-based security measures. However, Imperva itself suffered a cyber attack last week when a data breach affected users of Imperva’s Cloud Web Application Firewall (WAF). This […]

Continue reading

MS Word Trojan Malware out to steal your information

MS Word Malware Trojan

Alert: This Trojan Malware aimed at stealing bank details and personal information is spreading via infected Word documents. Which Malware? The Ursnif Trojan, a banking malware that has existed for more than a decade in some version or another since 2007, is back with a shrewder strategy. What is new This malware is aimed at […]

Continue reading

India’s IoT Deployments suffered 22% more cyberattacks in Q2

IoT deployments in India received the maximum number of attacks from a few geographies in Central Europe. These attacks were originating from a few botnets in the region. As per the Subex report, these attacks had strong geo-political influence, showing a trend that’s increasingly pointing towards electronic warfare. These attacks were also of reconnaissance type, […]

Continue reading

Coping up with evolving priorities and challenges of CISOs

Coping up with evolving Priorities and Challenges of CISOs

With the increasing cybersecurity attacks the role of CISOs have evolved drastically from their roles 20 years ago. CISOs have climbed up the executive management ladder due to their increase role in scale, scope and importance. Cybersecurity has become increasingly critical to the bottom line for many organizations, and the associated risks and costs have increased […]

Continue reading

Make your employees -your Strongest link in Cyber Security

Are your employees actually aware of the latest cyber security threats?

Your company may be using the latest software, hardware and other resources to protect against cyber security threats but unless your employees are aware of the latest malware, ransomware and phishing attacks, the purpose of all the cyber security tools will be defeated. A recent report by Proofpoint, Beyond the Phish , revealed that employees […]

Continue reading

American Express customers targeted by Novel Phishing Attack


American Express customers were targeted with a Novel Phishing attack for stealing customer credentials. The scammers targeted both corporate and consumer cardholders with phishing emails full of grammatical errors but with a small but deadly twist: instead of using the regular hyperlink to the landing page trick, this one used the HTML element to hide the […]

Continue reading

Increasing cyber attacks calls for increased security audits within IT companies

Increasing cyber attacks calls for increased security measures

Indian IT companies did not give high priority to cyber security but the increased number of cyber attacks have lead them into reconsidering their security. Clients typically had a generalized languages in their cyber security contracts for ensuring their protection from hackers but an exponential increase in cyber attacks have shown more is required. “It […]

Continue reading

India ranks second in cyber attacks with 38 attacks per second


India is a country with the second-largest number of account take-over logins – close to 1.38 lakh login’s per hour in 2018 cited by ‘Credential Stuffing: Attacks and Economies’, a 2018 Akamai report. An Account Take Over (ATO) occurs when a stolen login and password combination is used to access multiple accounts using bots. Remember […]

Continue reading

In the Tax Filing Season, beware of phishing attacks

income tax returns

Beware of email phishing attacks from hackers while filing your Income Tax Returns. In email phishing attacks, hackers smartly replace some characters of email address with other look-alike characters. Observe the below given E-mail addresses: First one is correct E-mail ID from the IT Dept. but if you observe properly the second one […]

Continue reading