How to protect your Cloud Files on Office 365

Office 365

Cloud computing has been around for quite some time now and it has changed the way we work. The productivity has no doubt improved but has security improved at the same pace? One of the great product from MS has been Office 365. It has grown tremendously since its launch. There are various other cloud […]

Continue reading


4 things you must know about Cyber Security in the era of IoT

Security in the era of IoT

Cyber Security in the era of Internet-of-things is a changing paradigm. According to recent study by Gartner, more than half of major new business processes and systems will include an IoT component by 2020. Cisco speculates that more than 50 billion connected devices will exist by 2020 which will definitely make our lives easier in […]

Continue reading


UIWIX Ransomware. The threat of WannaCry is not over yet.

Ransomware UIWIX

The evolved version of Wannacry ransomware; UIWIX Ransomware continues to shock the world. WannaCry Ransomware began spreading on May 12th but was accidentally stopped by a kill switch triggered by a MalwareTech researcher. However, it looks like the kill switch did not completely stop the spread rather slowed the speed. Hackers have since then updated […]

Continue reading


The latest global cyberattack – Wannacry Ransomware.

WannaCry

On May 12th 2017, a ransomware of WannaCry or Wcry started spreading like wildfire starting from NHS system in UK. It spread to dozens of hospitals from where it spread to 6 continents affecting more than 100,000 machines! It caused chaos at hospitals, schools and universities, manufacturing shutdowns, and overtime for cybersecurity professionals.  Reports have confirmed malicious […]

Continue reading


Received a new job offer? Beware- Genuine or Fake?

Fake Job Offers

Scammers are on the rise with more and more fictitious job offers appearing on job boards. More job seekers are being conned into traps to part with some amount of money or are becoming victims of identity theft. However, there are certain trends which can help user identify an email if it is fake job […]

Continue reading


Red-team Exercise: Explore your companies Vulnerabilities to Cyber-attack in 2017!

cyber attack

Red-team cyber security testing is optimally designed to measure how well your company’s defense and response capabilities will hold under a cyber-attack. All the tests are performed in a simulated environment which creates real-life situation. What is Red Team Exercise? It is an exercise based on military model, Red Teams are designed to rigorously test […]

Continue reading


How are Locky and Cerber Ransomware Skilled at hiding themselves?

locky and cerber ransomware

2 of the 3 major ransomware families responsible for 90% of ransomware attacks are Locky and Cerber Ransomware families. They are acutely notorious in hiding in plain sight. The camouflage helps the ransomware to hide inside the system and attack when unexpected. Once they encrypt the files there is no other way except to pay […]

Continue reading


PetrWrap: Cybercriminals stealing code from one another

petrwrap

The latest version of Petya based ransomware is PetrWrap. Petya ransomware has been distributed as ransomware-as-a-service wherein the creator of the ransomware shares the malware code as a product and shares the profits (ransom) after any attacker uses the Petya malware and succeeds.  Cyber criminals have found a way to use the code without sharing […]

Continue reading


Kirk Ransomware: Star trek themed malware!

Kirk Ransomware

A new piece of ransomware has surfaced featuring star trek theme, named Kirk Ransomware, the first of its kind ransomware demanding Monero cryptocurrency instead of Bitcoin. It was discovered by Avast malware researcher Jakub Kroustek. Cyber criminals are turning highly sophisticated with better, more secure ways to ask for ransom and hence a first for […]

Continue reading