The latest global cyberattack – Wannacry Ransomware.


On May 12th 2017, a ransomware of WannaCry or Wcry started spreading like wildfire starting from NHS system in UK. It spread to dozens of hospitals from where it spread to 6 continents affecting more than 100,000 machines! It caused chaos at hospitals, schools and universities, manufacturing shutdowns, and overtime for cybersecurity professionals.  Reports have confirmed malicious […]

Continue reading

Received a new job offer? Beware- Genuine or Fake?

Fake Job Offers

Scammers are on the rise with more and more fictitious job offers appearing on job boards. More job seekers are being conned into traps to part with some amount of money or are becoming victims of identity theft. However, there are certain trends which can help user identify an email if it is fake job […]

Continue reading

What is Penetration Testing? And Why is it important for your organization?

penetration testing

Penetration testing or commonly known as pen testing is another important way of testing your company’s preparedness for a cyber-attack. Lately, preparing for prevention against cyber-attacks has become an essential part of a board room agendas. More companies are looking at IT security as a vital aspect of company policy and spending massively to protect […]

Continue reading

Red-team Exercise: Explore your companies Vulnerabilities to Cyber-attack in 2017!

cyber attack

Red-team cyber security testing is optimally designed to measure how well your company’s defense and response capabilities will hold under a cyber-attack. All the tests are performed in a simulated environment which creates real-life situation. What is Red Team Exercise? It is an exercise based on military model, Red Teams are designed to rigorously test […]

Continue reading

How are Locky and Cerber Ransomware Skilled at hiding themselves?

locky and cerber ransomware

2 of the 3 major ransomware families responsible for 90% of ransomware attacks are Locky and Cerber Ransomware families. They are acutely notorious in hiding in plain sight. The camouflage helps the ransomware to hide inside the system and attack when unexpected. Once they encrypt the files there is no other way except to pay […]

Continue reading

PetrWrap: Cybercriminals stealing code from one another


The latest version of Petya based ransomware is PetrWrap. Petya ransomware has been distributed as ransomware-as-a-service wherein the creator of the ransomware shares the malware code as a product and shares the profits (ransom) after any attacker uses the Petya malware and succeeds.  Cyber criminals have found a way to use the code without sharing […]

Continue reading

Kirk Ransomware: Star trek themed malware!

Kirk Ransomware

A new piece of ransomware has surfaced featuring star trek theme, named Kirk Ransomware, the first of its kind ransomware demanding Monero cryptocurrency instead of Bitcoin. It was discovered by Avast malware researcher Jakub Kroustek. Cyber criminals are turning highly sophisticated with better, more secure ways to ask for ransom and hence a first for […]

Continue reading

The Home Ministry’s website hacked on 2017 February 12

home ministry’s website hacked

On 12th February, 2017 the home ministry’s website got hacked. Attacks on our digital borders have been increasing for some time now. Is this an indication that we are heading for a war for which we aren’t sufficiently prepared? How do you fight something so intangible? We cannot put men with firearms to kill the […]

Continue reading