The ABCs of Malware – An informative Blog Series (Part 2 of 3)

Types of Malware

All About Malware – Types of Malware This is Part Two of the Three Part Series of Malware Blogs. A short recap of Part One   As we saw before, malware is harmful code that hijacks your system and causes damage discreetly. Monetary gain and illegal access to private data are two foremost motivations behind a malware attack. We have learned of […]

Continue reading


The two branches of Phishing: Vishing and Smishing

vishing & smishing

Phishing gets two new neighbours, and they are just as deadly Phishing, which is the theft of information through fraudulent identities, has branched into two new forms of cyberattacks called as Vishing and Smishing. With the outbreak of smartphones going into a boom, the cyber-criminals have shifted their focus onto mobile devices. And thus evolved […]

Continue reading


Malware In Fake Income Tax Emails

Beware-fake-email-malware

Beware of Malware – It could be hiding in imposter income tax return emails! The internet has enabled individuals and companies to explore, innovate and expand. But it has also made life easier for scammers, malware attackers and hackers as their victims are more accessible to them than ever.   Recently, a malware was found […]

Continue reading


Machine Learning: A Protection Against Spear Phishing

Machine Learning Protects From Spear Phishing

How Machine Learning can help to protect your inbox from Spear Phishing Email is the easiest medium for malicious attackers to target. Today, more than 90% of targeted Threats enter your Organization through Emails!  The main difference between a common phishing email and a spear phishing email is that the common phishing email mimics a […]

Continue reading


Ransomware: An insidious, evolving Threat

Ransomware_ An insidious, evolving Threat

Ransomware is considered one of the most dangerous threats to organizations across the world. Malware authors are developing new malicious codes that implement new features to improve evasion and spreading abilities. Ransomware is most typically distributed through spam email attacks. The spam email will have an attachment disguised as a legitimate file or will include a URL […]

Continue reading


Microsoft warns Users of phishing attacks using custom 404 Pages

Microsoft warns Users of phishing attacks using custom 404 Pages

Microsoft Security researchers discovered an unusual phishing campaign replicating their Microsoft login page designed to look exactly like Microsoft’s official login page and redirecting it to a 404 error page in order to steal users’s login information. “The 404 Not Found page tells you that you’ve hit a broken or dead link – except when it doesn’t,” says […]

Continue reading


India’s IoT Deployments suffered 22% more cyberattacks in Q2

http://blog.logix.in/indias-iot-deployments-suffered-22-more-cyberattacks-in-q2/

IoT deployments in India received the maximum number of attacks from a few geographies in Central Europe. These attacks were originating from a few botnets in the region. As per the Subex report, these attacks had strong geo-political influence, showing a trend that’s increasingly pointing towards electronic warfare. These attacks were also of reconnaissance type, […]

Continue reading


Whale Phishing has risen to be a major cyber security threat

Whale Phishing has risen to be a major cyber security threat

A whale phishing attack is a specific type of phishing attack that targets high-profile employees, such as the CEO or CFO, in order to steal sensitive information from a company. Common whaling targets, like media spokespersons or C-level executives, by nature have more information about them publicly available for attackers to gather and exploit.  Due to their […]

Continue reading


Top 3 cybersecurity threats of 2019

Top 3 Cyber Security threats of 2019

Cybersecurity has risen ever higher up the corporate agenda for the very good reason that incidents and breaches result in significant costs—money or intellectual property stolen, valuable data compromised, business disruption, impaired brand reputation, reduced revenue and/or lowered share price. Cybersecurity incidents and breaches can seriously damage a company’s bottom line and brand image, making […]

Continue reading