Red-team Exercise: Explore your companies Vulnerabilities to Cyber-attack in 2017!

cyber attack

Share this:    Red-team cyber security testing is optimally designed to measure how well your company’s defense and response capabilities will hold under a cyber-attack. All the tests are performed in a simulated environment which creates real-life situation. What is Red Team Exercise? It is an exercise based on military model, Red Teams are designed to rigorously […]

Continue reading


How are Locky and Cerber Ransomware Skilled at hiding themselves?

locky and cerber ransomware

Share this:    2 of the 3 major ransomware families responsible for 90% of ransomware attacks are Locky and Cerber Ransomware families. They are acutely notorious in hiding in plain sight. The camouflage helps the ransomware to hide inside the system and attack when unexpected. Once they encrypt the files there is no other way except to […]

Continue reading


Staying ahead of the Cyber Security curve

Staying ahead of the Cyber Security curve

Share this:    IoT devices are set to revolutionize our lives. Companies are using IoT devices more than ever with automation and more AI to improve work efficiencies. How can a company ascertain if they are an easy target for cyber criminals? Are they adequately protected from cyber-attacks? is a moot question C-level executives deal with every […]

Continue reading


PetrWrap: Cybercriminals stealing code from one another

petrwrap

Share this:    The latest version of Petya based ransomware is PetrWrap. Petya ransomware has been distributed as ransomware-as-a-service wherein the creator of the ransomware shares the malware code as a product and shares the profits (ransom) after any attacker uses the Petya malware and succeeds.  Cyber criminals have found a way to use the code without […]

Continue reading


Finding the appropriate Content Management System(CMS) for your Organization

CMS Content Management System

Share this:    In today’s market, you can find a Content Management System(CMS) at arm’s length. How do you pick the right content management system for your organization? Selecting the right CMS is a daunting task with a wide variety of open source as well as commercial offerings. A CMS is very important for coordination of marketing […]

Continue reading


Kirk Ransomware: Star trek themed malware!

Kirk Ransomware

Share this:    A new piece of ransomware has surfaced featuring star trek theme, named Kirk Ransomware, the first of its kind ransomware demanding Monero cryptocurrency instead of Bitcoin. It was discovered by Avast malware researcher Jakub Kroustek. Cyber criminals are turning highly sophisticated with better, more secure ways to ask for ransom and hence a first […]

Continue reading


Selecting A Cloud Firewall System

cloud firewall system

Share this:    Cloud, the ease of use which comes with it and of course cloud firewall system has become the most talked-about topics in the industry. Traditional firewalls are not effective given the type and range of applications users are accessing. Recent cloud statistics suggests that spending on cloud will grow from $180B in 2015 to […]

Continue reading


Lawful Implementation of DLP Plan in India

lawful implementation of DLP

Share this:    Data loss prevention (DLP) systems are crucial tools for the safeguards of intellectual property and business secrets. IT is the business enabler in every company, however the simplicity of communication calls for major risk for sensitive information. Employees with access to such information may- deliberately or inadvertently -leak such data to third parties. Cases […]

Continue reading