Formbook Malware spreading widely by clicking Microsoft URL shortcut files in your emails

Do not click Microsoft attachments from unknown senders Formbook

Be careful when you receive attachments to an email, it can be an entry point to Formbook Malware. Formbook malware mainly steals data from forms tracking keystrokes and form submissions, hence the name Formbook. It can also execute several commands on the victim’s machine from the attacker’s servers. It is widely being spread via malicious […]

Continue reading


Rarog – A cryptomining Trojan is out in the wild

Rarog

A malware family Rarog is out in the internet and being excessively used by the cyber criminals to execute cryptocurrency mining operations. Reseachers claim it to be an appealing option for hackers due to its low cost, easy configurations and support for multiple cryptocurrencies. Palo Alto Networks’ Unit 42 research team, which posted a blog on Wednesday […]

Continue reading


Microsoft Office 365 provides new Advanced Security Features

Microsoft Office 365 with added Security features

Microsoft Office 365 is widely popular work office suite, among the SMBs. Hence, no doubt that it has become one of the favourite targets of cyber criminals for viruses, ransomware scams and phishing attacks.  Last year we encountered some vicious ransomwares, like Wannacry and NotPetya, which had wreaked havoc across the globe affecting millions of […]

Continue reading


The rising and falling cyber security trends in 2018

The rising and falling cyber security trends in 2018

Current Rising Trends of Cyber Security AI/Machine Learning is picking up Artificial Intelligence(AI) has the power to learn catch up with things and learning from the past experience predicting and stopping similar threats to occur in future. There will be more cyber security software using Machine Learning (ML) to crack any hacks or attacks. ML […]

Continue reading


Latest technology innovations affecting cyber security

latest technology innovations

Technology is building our future, there is no denying but with every new innovation comes new vulnerabilities and hence the responsibility to make the internet more secure. The increasing digital connectivity and the automation of virtually all processes around the world in business and otherwise at all levels in the value chain have led to […]

Continue reading


How cloud is influencing the roles and responsibilities of CIO?

Cloud is transferring the roles and responsibilites of CIOs

Cloud has had a gigantic effect on the software industry. And its impact on CIO’s roles and responsibilities is dominant. With the cloud technology, CIO is no more just a keeper of the technology but a Chief of Information in all sense, managing the sensitive company data as an organization asset. In order to keep […]

Continue reading


With the increasing third party leaks, Aadhar Card systems need security reviews

Hacking the aadhar. UIDAI data breach

Aadhar Card database is by far one of the largest government databases on this planet consisting of more than 111 crore entries of Indian citizens. It contains both demographic and biometric data of all the citizens across India. While the Unique Identification Authority of India (UIDAI) has claimed its database to be secure with no […]

Continue reading