Diablo6 – a variant of Locky Ransomware

Diablo6 Ransomware

Many ransomwares continue to spread because email is ubiquitous and users are not cautious to maintaining cyber security. Such is an example of the latest ransomware – Diablo6, a variant of an older Locky ransomware. A spam mail with subject as E [random date]( random number). docx and an attachment of a Zip with the […]

Continue reading


How to invest smartly using cyber security metrices!

cyber security metrices

In the hoax, usually companies end up spending blindly on the most crucial cyber security metrices, they need for their companies to run smoothly. Statistics reveal a grave picture as to how companies have no measurement criteria to choose a security service as well as measure the effectiveness and efficiency of existing safeguards. Most of […]

Continue reading


Which is the most apt vaccine for 2017 epidemic: Cyber-Attacks?

cyber-attacks

With Internet, digitization, automation transformation taking center stage, cybersecurity turns up as one of the biggest concern. Email remains the biggest threat vector for cyber-attacks – claims a recent survey by Barracuda. Already multiple threats or comprises have been the part of cloud computing, IoT, mobile activities. Organizations need to look at the landscape to […]

Continue reading


In 2017, to save yourself from hackers make DLP and cyber security walk hand in hand

DLP and Cyber Security walk hand in hand

Every business today is on networked computer systems in order to achieve higher work efficiency with smooth collaboration, storage and access to systems. The cloud technology is the most upcoming technology for accessing data from anywhere and everywhere. While we store data in cloud or internet, there is a significant boost in the productivity but […]

Continue reading


Use your own Data wisely to detect an attack!

data

Perennial, for a problem to exist that cyber-criminals areahead of security measures deployed. Your own data can be used effectively to hit the achilleas heel of the attacker.  Since the sophistication grows with time so must the traditional methods of security. Threat detection systems based on signatures, file checksums or blacklisted URLs are all passé. […]

Continue reading


Cyber threats may wreak Havoc by 2020

2020

India will face increasingly sophisticated “destructive” cyber threats as compared to the current scenario which is adding up to 200 million, malware related and 1,90,000 unique, intrusion related attacks in any given week. Gulshan Rai Indian cyber security chief briefed the Parliament’s finance standing committee that the cyber-attacks of nuisance and viruses of 2000’s have […]

Continue reading


Increase Threat Hunting beyond ATP Tools

atp

ATP tools are the core of most of the cyber-crime fighting software’s. Today, we have a generation of products from vendors promising state-of-art detection using machine learning, neural networks, and threat intelligence. With all the promises of safe keeping and the demo where the installed system detects and blocks the malicious stuff- we still have […]

Continue reading


Do you know, if there is an intruder in your network!

intruder

You need to believe that you are being compromised before you start helping your organization stay secure. Intruders can very well lay low in the company’s network for weeks or months before they would actually cause any damage. Let us take you through a situation- Via the system of marketing head of you company an […]

Continue reading


Current Cyber-heist- Not just personal or corporate!

cyber heist

Yes, you read that right. Cyber criminals are not just after your personal or corporate data of the companies but something much bigger. No doubt, personal or corporate data including health, financial data has many takers on the market of if not, the companies can be kept hostage for ransom. For some companies, however there […]

Continue reading