Dark Web Exposes Computer-Server Data Transfer to Hackers

Dark Web Exposes Computer-Server Data Transfer to Hackers

As startling as it may sound but cybercriminals now have access to the most-secured data files used to facilitate confidential communication between organisations’ servers and clients’ computers on the Dark Web. Although Ransomware have been available in the dark web as a service for quite some time now but security certificates is a new phenomena. […]

Continue reading


Latest DNS Spoofing attacks use fragmented datagrams. Can you avoid it?

dns spoofing using fragmented datagrams

With a little attention, as it turns out, one can spoof fake DNS responses using fragmented datagrams. How is it done? To match authentic DNS responses to their corresponding queries, resolvers and operating system check: Name of the query Type of the query Source/destination address Destination port (16 bits) DNS transaction ID (16 bits) The […]

Continue reading


Facebook’s massive Data breach: what you need to know

facebook data breach

The worries for facebook do not seem to stop with cambridge analytica and this time around it’s a massive data breach of almost 50 million user accounts and another 40 million which are at risk, the vulnerability allowed hackers to take direct access to all these accounts information. As per Facebook, the bugs that enabled […]

Continue reading


Indian BFSI Sector needs to be prepared for upcoming data protection laws

Data ProtectionLaws for Indians

The increase in financial crimes is not only a threat to BFSI (Banking, Financial Services and Insurance) companies but it also touches the daily life of millions of people across the globe. According to a recent study, only 1% of the $2.4 trillion laundered through international financial systems is believed to be confiscated. According to […]

Continue reading


Internet Explorer Zero-day “Double-kill”

Internet Explorer zero-day

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code, host website and lead the victim to view compromised websites. Kaspersky and Qihoo360 independently discovered this zero-day vulnerability (CVE-2018-8174)  for Internet Explorer […]

Continue reading


Data hacked during EPFO-Aadhar seeding

epfo aadhar

Cyber criminals seem to have hacked the EPFO data which holds information like name, Aadhar card number, bank details of 2.7 Cr Indians. The vulnerabilities in Aadhar seeding with PF accounts may have been exploited to steal the data. The statement from the EPFO came amid reports of a letter allegedly written by EPFO Central Provident […]

Continue reading


Latest technology innovations affecting cyber security

latest technology innovations

Technology is building our future, there is no denying but with every new innovation comes new vulnerabilities and hence the responsibility to make the internet more secure. The increasing digital connectivity and the automation of virtually all processes around the world in business and otherwise at all levels in the value chain have led to […]

Continue reading