Diablo6 – a variant of Locky Ransomware

Diablo6 Ransomware

Many ransomwares continue to spread because email is ubiquitous and users are not cautious to maintaining cyber security. Such is an example of the latest ransomware – Diablo6, a variant of an older Locky ransomware. A spam mail with subject as E [random date]( random number). docx and an attachment of a Zip with the […]

Continue reading


In 2017, to save yourself from hackers make DLP and cyber security walk hand in hand

DLP and Cyber Security walk hand in hand

Every business today is on networked computer systems in order to achieve higher work efficiency with smooth collaboration, storage and access to systems. The cloud technology is the most upcoming technology for accessing data from anywhere and everywhere. While we store data in cloud or internet, there is a significant boost in the productivity but […]

Continue reading


Website leaks data of 120 million Reliance Jio users, Telco claims data is safe?

data leaks

This could be the biggest data breach in India. The data is supposedly leaked on a website called magicapk. The leaked details include sensitive user information such as- Name, Jio number, the region from where the sim has been activated, email id and even Aadhar number has been exposed. Magicapk showed the user information in […]

Continue reading


Cyber Security Lessons to learn from the latest RNC Data Leak

data leaks

Important lessons are learned the hard way. Republican National Committee (RNC) hired Deep Root Analytics, a data analytics firm to profile voters and they left sensitive- 9.2 billion data point amounting to information of nearly 200 million American citizens on an unsecured web server. A poorly configured amazon S3 bucket that could have led to […]

Continue reading


Which is the best choice for your organization- Shared or Dedicated web hosting?

shared or dedicated web hosting

Running a mid-sized business; choosing between a shared and dedicated web hosting can be a big challenge. Even when companies expand their e-commerce website, they often face the challenge of selecting dedicated or shared web hosting. Let us evaluate the important factors while choosing the service- What is being hosted? A shared hosting means other sites […]

Continue reading


Red-team Exercise: Explore your companies Vulnerabilities to Cyber-attack in 2017!

cyber attack

Red-team cyber security testing is optimally designed to measure how well your company’s defense and response capabilities will hold under a cyber-attack. All the tests are performed in a simulated environment which creates real-life situation. What is Red Team Exercise? It is an exercise based on military model, Red Teams are designed to rigorously test […]

Continue reading


Staying ahead of the Cyber Security curve

Staying ahead of the Cyber Security curve

IoT devices are set to revolutionize our lives. Companies are using IoT devices more than ever with automation and more AI to improve work efficiencies. How can a company ascertain if they are an easy target for cyber criminals? Are they adequately protected from cyber-attacks? is a moot question C-level executives deal with every day. […]

Continue reading


New target for hackers this year : Mac OS

Mac OS hack

A second example of Malware targeting Mac OS has surfaced in the past few weeks. Macro is a series of commands and actions that help automate some tasks. Macro malware- commonly referred to as a “word macro virus” is a word-macro based attack relying on automatically-running macros embedded in Microsoft word documents. A cybercrime group […]

Continue reading


The Home Ministry’s website hacked on 2017 February 12

home ministry’s website hacked

On 12th February, 2017 the home ministry’s website got hacked. Attacks on our digital borders have been increasing for some time now. Is this an indication that we are heading for a war for which we aren’t sufficiently prepared? How do you fight something so intangible? We cannot put men with firearms to kill the […]

Continue reading