Cryptojacking Attack hits Aditya Birla Group

Aditya Birla Group became a victim of a huge Cryptojacking Attack

Share this:    A big cryptojacking attack took place first time in the country last month. The target was the Aditya Birla Group – one of India’s largest business conglomerates headquartered at Mumbai. 2000 plus computers were infected by cyber criminals for cryptojacking – a cyber attack where hackers misuse the victim’s terminals and exploit their processing […]

Continue reading


Data hacked during EPFO-Aadhar seeding

epfo aadhar

Share this:    Cyber criminals seem to have hacked the EPFO data which holds information like name, Aadhar card number, bank details of 2.7 Cr Indians. The vulnerabilities in Aadhar seeding with PF accounts may have been exploited to steal the data. The statement from the EPFO came amid reports of a letter allegedly written by EPFO Central […]

Continue reading


Smartly defining RPO and RTO for Disaster Recovery Plans

Smartly define RPO and RTO

Share this:    Recovery Point Objective (RPO) and Recovery Time Objective (RTO) are 2 most important parameters for a disaster recovery and business continuity plan. RPO is referred to the point in past which you will recover to in case of any disaster. In another words, it is the threshold of how much data you can afford […]

Continue reading


Formbook Malware spreading widely by clicking Microsoft URL shortcut files in your emails

Do not click Microsoft attachments from unknown senders Formbook

Share this:    Be careful when you receive attachments to an email, it can be an entry point to Formbook Malware. Formbook malware mainly steals data from forms tracking keystrokes and form submissions, hence the name Formbook. It can also execute several commands on the victim’s machine from the attacker’s servers. It is widely being spread via […]

Continue reading


Rarog – A cryptomining Trojan is out in the wild

Rarog

Share this:    A malware family Rarog is out in the internet and being excessively used by the cyber criminals to execute cryptocurrency mining operations. Reseachers claim it to be an appealing option for hackers due to its low cost, easy configurations and support for multiple cryptocurrencies. Palo Alto Networks’ Unit 42 research team, which posted a blog on […]

Continue reading