Current Cyber-heist- Not just personal or corporate!

cyber heist

Yes, you read that right. Cyber criminals are not just after your personal or corporate data of the companies but something much bigger. No doubt, personal or corporate data including health, financial data has many takers on the market of if not, the companies can be kept hostage for ransom. For some companies, however there […]

Continue reading


Cyber Security Lessons to learn from the latest RNC Data Leak

data leaks

Important lessons are learned the hard way. Republican National Committee (RNC) hired Deep Root Analytics, a data analytics firm to profile voters and they left sensitive- 9.2 billion data point amounting to information of nearly 200 million American citizens on an unsecured web server. A poorly configured amazon S3 bucket that could have led to […]

Continue reading


How to protect your Cloud Files on Office 365

Office 365

Cloud computing has been around for quite some time now and it has changed the way we work. The productivity has no doubt improved but has security improved at the same pace? One of the great product from MS has been Office 365. It has grown tremendously since its launch. There are various other cloud […]

Continue reading


4 things you must know about Cyber Security in the era of IoT

Security in the era of IoT

Cyber Security in the era of Internet-of-things is a changing paradigm. According to recent study by Gartner, more than half of major new business processes and systems will include an IoT component by 2020. Cisco speculates that more than 50 billion connected devices will exist by 2020 which will definitely make our lives easier in […]

Continue reading


Chinese Fireball Malware affects 250 Mn computers. India most affected.

Chinese Fireball Malware

Possibly the largest malware infection operation in the history is on its way with Fireball Malware. The Chinese malware is presumably inside a quarter billion PCs already and is present in 20% of the networks worldwide claims Check Point. The major infection center is supposed to be India, Brazil and Mexico. While the world is […]

Continue reading


UIWIX Ransomware. The threat of WannaCry is not over yet.

Ransomware UIWIX

The evolved version of Wannacry ransomware; UIWIX Ransomware continues to shock the world. WannaCry Ransomware began spreading on May 12th but was accidentally stopped by a kill switch triggered by a MalwareTech researcher. However, it looks like the kill switch did not completely stop the spread rather slowed the speed. Hackers have since then updated […]

Continue reading


The latest global cyberattack – Wannacry Ransomware.

WannaCry

On May 12th 2017, a ransomware of WannaCry or Wcry started spreading like wildfire starting from NHS system in UK. It spread to dozens of hospitals from where it spread to 6 continents affecting more than 100,000 machines! It caused chaos at hospitals, schools and universities, manufacturing shutdowns, and overtime for cybersecurity professionals.  Reports have confirmed malicious […]

Continue reading


Received a new job offer? Beware- Genuine or Fake?

Fake Job Offers

Scammers are on the rise with more and more fictitious job offers appearing on job boards. More job seekers are being conned into traps to part with some amount of money or are becoming victims of identity theft. However, there are certain trends which can help user identify an email if it is fake job […]

Continue reading


What is Penetration Testing? And Why is it important for your organization?

penetration testing

Penetration testing or commonly known as pen testing is another important way of testing your company’s preparedness for a cyber-attack. Lately, preparing for prevention against cyber-attacks has become an essential part of a board room agendas. More companies are looking at IT security as a vital aspect of company policy and spending massively to protect […]

Continue reading