Blogs

News and resources on IT and cyber security

Midnight Blizzard Strikes Microsoft

Microsoft recently experienced a serious cyberattack by a Russian-linked criminal group, Midnight Blizzard, also known as Nobelium. Experts are calling [...]

Understanding Gmail and Yahoo DMARC Requirements

In an effort to bolster email security, Google and Yahoo announced new requirements for bulk senders regarding Domain-based Message Authentication, [...]

4 Crore Whale Phishing Scam

As our digital world expands, so does the danger of cyber threats. Recently, thousands of people have fallen prey to [...]

Ransomware Strikes Hospitals, Disrupting Patient Care

Hospitals faced significant challenges this week as ransomware attacks disrupted crucial services, impacting patient care and medical operations. Despite assurances [...]

Uber Slapped with AUS$412,500 Fine in Australia for Violating Anti-Spam Laws

In a recent development, the Australian Communications and Media Authority (ACMA) has imposed a substantial fine of AUS$412,500 (equivalent to [...]

Ensuring a Safer and Spam-Free Email Experience: Gmail’s New Initiatives for 2024

In the two decades since Gmail revolutionized email communication, the landscape of online threats has evolved significantly. The latest announcement [...]

Cybersecurity 101: A Complete Guide on Online Privacy

In an age dominated by technology, the question of privacy is more pertinent than ever. "I have nothing to hide" [...]

Pune Faces Wave of Whale Phishing Scams: Cyber Criminals Targeting Top Executives

In a concerning trend, cybercriminals have been employing sophisticated tactics to defraud several Pune-based companies by impersonating their Chief Executive [...]

Mastering Endpoint Detection and Response (EDR): Your Shield Against Evolving Threats

With cyber threats constantly evolving, businesses need cutting-edge solutions to protect their data and operations. Endpoint Detection and Response (EDR) [...]

Shifting to SASE for Simplifying Security in a Cloud-Driven World

In the dynamic world of cyber security, a new term has emerged: SASE, pronounced as "sassy." SASE stands for Secure [...]

Embracing Zero Trust Network Access (ZTNA) for Enhanced Cybersecurity

In an era where cyber threats are becoming increasingly sophisticated, and remote work has become the norm, traditional network security [...]

Malicious Email Attachments Even from Bonafide IDs

In a concerning development, the government has issued a cybersecurity circular, cautioning officials about the potential risks associated with email [...]

Beware of Ongoing Phishing Campaign Targeting Zimbra Collaboration Servers

In recent months, an alarming cybersecurity threat has emerged, targeting Zimbra Collaboration email servers worldwide. This phishing campaign, which began [...]

New Phishing Campaign Delivers LokiBot Malware Through Microsoft Word Vulnerabilities

In a startling revelation, cybersecurity experts have uncovered a sophisticated phishing campaign that employs cunning tactics to drop the notorious [...]

Strengthening Email Security for PCI DSS Compliance: The Role of DMARC

PCI DSS (Payment Card Industry Data Security Standards) is a set of vital regulations that companies dealing with cardholder information [...]

Zero-Day in Salesforce Email Services

A recent spear-phishing campaign has brought to light the significance of staying vigilant against advanced hacking techniques. A leading cybersecurity [...]

The Rising Threat of ‘Phishing as a Service’ – How FraudGPT Exploits Generative AI

The power of Generative AI has given rise to both transformative advancements and unforeseen risks. One such risk has appeared [...]

Evolving Cyberattack Landscape

The cyberattack landscape is constantly evolving, with cybercriminals becoming more sophisticated in their methods. According to Acronis' biannual threat report, [...]

Ransomware Attack on AIIMS Triggers India’s National Cybersecurity Response Framework

In a significant move to bolster India's cybersecurity measures, the government has introduced the National Cybersecurity Response Framework (NCRF) following [...]

Enhancing Customer Engagement with BIMI: The Key to Building Trust and Recognition

Businesses strive to stand out in the crowded online marketplace and foster strong connections with their customers. Building and maintaining [...]

Exploring the Role of Firewall Technologies in Network Security

Understanding the need for firewall technologies In today's interconnected world, network security plays a vital role in safeguarding sensitive information [...]

How can IT and cybersecurity vendors enhance their email security & mailing offerings?

In today's dynamic business landscape, establishing a strong brand presence and harnessing the power of cutting-edge technology is crucial for [...]

SMTP Security and Authentication

In today's digitally interconnected world, email has become an indispensable means of communication for individuals and businesses alike. However, with [...]

Fortinet Ransomware Protection Survey

In today's interconnected digital landscape, organizations face a persistent and growing threat from ransomware attacks. These malicious attempts to encrypt [...]

Barracuda Zero-Day Exploit

In a shocking revelation, cybersecurity researchers have discovered that a zero-day vulnerability in Barracuda's security products has been actively exploited [...]

Benefits of DMARC for Email Domain Protection

In today's digital landscape, email has become an integral part of our personal and professional lives. However, the rise of [...]

Improving your cyber security strength

The percentage of companies globally ranked as mature in device security is 31%, while in data security, it is 22%. [...]

How Deepfake is risky

What is deep fake? Deepfake has gained wide accessibility and popularity. Deepfake refers to videos or any digital representations which [...]

How VolumeMail SMTP Can Improve Your Business Email Marketing Strategy

Email marketing is a powerful tool for businesses of all sizes, allowing them to reach customers directly and effectively. However, [...]

How to Improve Your Email Deliverability with BIMI

Email marketing is a crucial aspect of any business's strategy. However, with the rise of email threats and spam filters, [...]

Why Regular Web Security Assessments Are Critical for Your Business

Cyber security threats are becoming increasingly sophisticated, making it more challenging for businesses to protect themselves from attacks. As a [...]

4 Ways to Spot and Avoid Phishing Scams

Phishing scams are a widespread problem in today's digital age. Criminals use this method to obtain sensitive information from individuals [...]

Microsoft 365 for work efficiency

As the world continues to grapple with the effects of the COVID-19 pandemic, organizations around the globe have had to [...]

Secure SD-WAN

Wide area network i.e. WAN is a telecommunications network which spreads over a large geographic region. It helps facilitate communication [...]

Why Backup Microsoft 365: A Simple Guide

Microsoft 365 is important for storing sensitive data like emails and documents. But sometimes, things can go wrong, and your [...]

Enhanced capabilities of Perception Point Advanced Email Security

The prevalence of cyber threats continues to evolve, making robust email security solutions a critical component of any organization's cybersecurity [...]

Tamper-Proof Your Microsoft 365 Data Protection with Acronis Cyber Protect

In the dynamic landscape of today's digital business world, Microsoft 365 has become the backbone of productivity for countless companies, [...]

SASE: The Network Security Game Changer for Businesses

SASE combines essential functions like web filtering, cloud app protection, and secure remote access into one unified platform. It simplifies [...]

Protection with Acronis Cyber Protect

In the dynamic landscape of today's digital business world, Microsoft 365 has become the backbone of productivity for countless companies, [...]

Phishing and Cyber Incidents in 2022

As 2023 slowly draws to a close, we reflect on the cyber incidents that began rising in 2022 and created [...]

Massive Aadhaar Data Breach Exposes Personal Information of 81 Crore Indians on Dark Web

In a significant cybersecurity incident, a report from US-based cybersecurity firm Resecurity reveals a massive data breach exposing the personal [...]

Targeting Zimbra Collaboration Servers

In recent months, an alarming cybersecurity threat has emerged, targeting Zimbra Collaboration servers worldwide. This phishing campaign, which began in [...]

Australia for Violating Anti-Spam Laws

In a recent development, the Australian Communications and Media Authority (ACMA) has imposed a substantial fine of AUS$412,500 (equivalent to [...]

Harnessing the Power of AI and ML for Robust Email Security

Email security remains a critical battleground. With over 90% of cyberattacks beginning with phishing campaigns, safeguarding your organization's sensitive data [...]

Benefits of Simulated Phishing Programs

In the ever-changing cybersecurity landscape, organizations struggle with the constant threat of cybercriminals exploiting vulnerabilities and compromising valuable information. To [...]

Specialized Email Gateways to Combat IP Blacklisting

In modern communication, email remains a critical tool for businesses and individuals to connect, collaborate, and communicate. However, for organizations [...]

Understanding and Preventing DNS Attacks for Better Network Security

Network security is a critical concern in today’s digital landscape. As organizations heavily rely on the internet and web-based services, […]

3 Ways Microsoft Teams Phone Boosts Workplace Productivity

Voice communication is a crucial element in business that plays a vital role in bridging the gap between customers and […]

Cyber Security for Financial Institutions

The scope of cyber security for financial institutions has expanded in recent years and will continue to become even more [...]

Mahesh Bank Cyber Incident – ₹65 Lakh Penalty for Lapses in Cybersecurity

The Mahesh Bank cyber incident was a shocking episode for banks across India. Mahesh Bank fell victim to a significant [...]

Additional security for Office 365

Do you need additional security for Office 365?  When users deal with giants like Microsoft, they believe that security is [...]

The Role of DMARC In Combatting BEC Attacks

Living in today’s world, it is extremely likely you have been using business email for quite a while. It’s also [...]

ION Group Ransomware Attack

LockBit ransomware strikes again ION Group, a software company located in the UK faced a serious cyberattack on January 31, [...]

4 Effective Email Marketing Campaigns for Small Businesses

Email marketing campaigns have proved to be the most ROI-positive marketing tools for small businesses which are looking to increase [...]

Understanding Simulated Phishing Campaigns with 5 Easy Steps

Simulated phishing campaigns to combat social engineering Phishing simulation is your tool to prevent your employees from falling victim to [...]

Top 10 Open Source Software Threats

Software supply chains have been exploited more and more in the recent past due to lack of cyber security vulnerabilities. [...]

GPT responsible for new-age AI-assisted phishing attacks

Phishing attackers have been tricking users into divulging their credentials with phishing and misuse it to wreak havoc. But with [...]

4 Useful DMARC Monitor Services to Protect Email Domain

What is DMARC? Before we dive into how DMARC Monitor services can improve your email security, let us first understand [...]

The Logix Partnership Program

About Logix and its Partnerships with Domain Leaders Since 1999, Logix InfoSecurity is a prime Cloud Email Security and Mail [...]

Inbound VS Outbound Email

Outbound marketing generates 3 times fewer returns than inbound marketing. Having said this, marketers sometimes don’t have a clear idea [...]

Importance of security awareness training

Why is security awareness training important? What does security awareness training entail? Security awareness training is a powerful tool used [...]

3 essential data protection components in cyber security

While several things about cyber security revolve around managing the intangible aspects of your business such as employee awareness and [...]

ICC BEC Scam

ICC BEC Scam: Around $2.5 million vanished from the ICC Account The Indian Cricket Council fell prey to a massive [...]

Harmful ChatGPT phishing and BEC scams

The problem with GPT-3 and ChatGPT phishing scams GPT-3 is truly valuable AI that uses deep learning technology resulting in [...]

GoDaddy Compromised For The Last 3 Years – Terrorists Go Mad

GoDaddy has disclosed that a group of hackers had access to their network for approximately three years. The hackers were [...]

7 organizational habits for a security aware culture

Security awareness For establishing a security aware culture, cyber security needs to go beyond today’s technological advancements. It should include [...]

5 Security Trends You Must Follow in 2023 For Maximum Impact

It was quiet tough to follow the security trends, especially considering the rapid digitization of virtually all our personal and professional activities.

AIIMS Ransomware Attack – Havok at the Medical Institute

The All India Institute of Medical Sciences recently fell prey to a crippling ransomware incident, resulting in a complete server […]

Benefits of Instant Messaging for Small Businesses

In the past couple of years, we transitioned from onsite work to Work from Home and now we finally seem […]

Modern email scams are more personal and deadlier

When we hear news about this scam or that, we often wonder how someone else could’ve fallen for such an […]

Optimize your email security architecture to prevent phishing

Over the past several years, early-stage detection and response to email threats have saved multiple organizations from severe disruption. However, […]

Preventing Data Breaches – Best Practices for Businesses

If you are a business with an online presence – which in 2022 you most definitely are – then you […]

Strengthening the human element for better cybersecurity

Businesses tend to be a bit apprehensive about proper cybersecurity training for their employees because they feel it distracts them […]

Paying Ransomware Amounts

Ransomware is a nasty problem to have. With one mindless click or an unwitting file download, your entire organization faces […]

Microsoft Solutions for Hybrid Work

The recent past is an indicator that businesses undeniably need a digital setup to do their best, most professional work. […]

The Benefits of BIMI for Email Marketers

About BIMI (Brand Indicators for Message Identification) BIMI is an emerging email authentication protocol that allows your brand logo to […]

2022 Cloud Security Reports

Understanding cloud security insights Recent trends of remote working and off-site collaboration have pushed businesses to speed up their digital […]

Microsoft Advanced Solutions for Better, Faster, and More Secure Work

Over the course of 2022-23, Microsoft is all set to release a suite of solutions, especially considering the newly developing […]

The Importance of Digital Trust

Why digital trust – The changing trends of digital businesses The business world has now shifted its pivotal operations to […]

Understanding Transport Layer Security (TLS)

When it comes to email security, it is not enough to enforce protection at just the sender’s and receiver’s end. […]

What is a firewall?

A firewall is an essential part of any network security setup. It is a device – either hardware or software […]

SSL Certificates – 7 Best Practices You Must Follow

In an earlier blog on SSL Certificates we went over the reasons SSL certificates are important. It is a vital […]

4 Ways Microsoft Collaboration Tools Go the Extra Mile

A business can only succeed when its resources work together cohesively towards a common objective. Rock-solid teamwork and dependability are […]

Your Guide to Choosing a Network Firewall

Firewall options and deployments are very flexible. They can be configured as per your objectives and requirements. The challenge comes […]

Oil India HQ Gets Ransom Demand of Rs 60 Crore

The registered headquarters of Oil India Limited (OIL) at Duliajan in Assam is caught up in a messy cyber threat. […]

Securing hybrid IT environments

When cloud technologies had first emerged, several businesses had jumped on the bandwagon. Now, the cloud has matured tremendously, and […]

Microsoft Shuts Down Exchange Online Basic Authentication Services

As cyber-attacks continue targeting remote workers and hybrid environments, Microsoft is taking active efforts to edify Exchange Online customers about […]

Deprecation of Microsoft Basic Authentication for Exchange Online

Until recently, the industry has relied on basic authentication as a security mechanism to connect to remote and local servers, […]

Celebrating Safety this National Cybersecurity Awareness Month (NCSAM 2022)

Every year, October is observed as National Cybersecurity Awareness Month. During this month, organizations strive to raise awareness about safeguarding […]

How Zimbra Collaboration Tool Revamped During the Pivotal Pandemic Stage

The Covid-19 pandemic seems to be receding in impact but back when it started, it threatened to disrupt business operations. […]

How Digital Transformation has become a necessity for businesses

Over the past couple of years, businesses have absolutely had to evolve digitally. Reinventing a business with a digital transformation […]

Choosing the right email server software

Since every business today hinges on emailing, choosing the right email server software will take you a long way in […]

Introducing Bharat Param Sneh Seva Sansthan (BPSSS)

The Bharat Param Sneh Seva Sansthan (BPSSS) is an admirable organization working passionately to lend a hand to those who […]

A Concise Guide on Email Security

Email has become omnipresent. No matter which industry your business belongs to, we are willing to bet you use email […]

A CrimsonRAT Among Indian Officials

Threat actors belonging to the notorious Transparent Tribe group have launched another cyber attack campaign, this time targeting Indian officials. […]

Cybersecurity Projections for the Rest of 2022 [And beyond]

Unfortunately, us cybersecurity professionals do not need magical powers to look into the future when it comes to cyber incidents. […]

Improve Network Agility with Zero Trust

Major factors in maximizing network agility today include the use of software-based structure, the flexibility to be dictated by user […]

US Infrastructure Attacked by AvosLocker Ransomware

Higher up authorities in the United States of America, including the FBI and the Treasury Department have recently issued a […]

Microsoft Security Now Enhanced with New Multicloud Capabilities

Microsoft is often known for its dependability and comprehensive solutioning. However, customers seldom realize Microsoft’s versatility and agility. When the […]

The 4 Challenges of Data Protection – With Pro Tips

Today, along with monetary transactions, every business also conducts data transactions. These are in terms of acquiring customers, chasing leads, […]

Zimbra – Google Workspace Coexistence Solution

What was the impetus for the Cloud Zimbra – Google Coexistence Solution? G Suite Free Edition is counting down the […]

Expeditors Ransomware Attacks Put Company in Trouble

Expeditors, an American logistics and freight transport company based out Washington, USA, faces total disruption at the hands of severe […]

Save Mailbox Space with Single Instance Storage of Cloud Zimbra

Save mailbox space? It’s possible that the thought hasn’t even crossed your mind. But with tons of emails being fired […]

Puma Data Breach – Effects of Kronos Ransomware Attacks

The Kronos Private Cloud (KPC), which caters to several companies, recently fell victim to a ransomware threat. Following the Kronos […]

Data Privacy Needs Intensify – Corporate Instagram Account Hijacking

Data has become as equally profitable for hackers as money. They can use their ownership of the data to exploit […]

Email Security Best Practices for Small Businesses

In a previous blog, we discussed why professional email is a necessity even if you’re a small business owner. While […]

Why Professional Email for Small Businesses Is a Necessity

Mailing goes with business operations like hand and glove. Today, sending and receiving emails is visceral part of day-to-day business […]

Password Strength Can Tighten Your Cybersecurity

Following the best cyber safety practices in your organization can go a long way in improving your cybersecurity posture. People […]

Ikea Email Server Attacks

Ikea, popular furnishing company, faces the heat of cybercrime as Ikea email servers get hit by phishing attacks. The Ikea […]

Proofpoint Phishing Attack Harvests Email Logins

In a recent Proofpoint phishing attack, email logins for Microsoft and Google for several hundred employees were stolen. The cybersecurity [...]

Secure Microsoft 365 Email with Cisco Cloud Mailbox Defense

In this blog, we are going over ways you can improve your cloud email security. In particular, we will discuss […]

Ukraine faces cyber trouble – Ukrainian bank and State websites hit

Global situations with respect to Ukraine are dire. But along with geopolitical issues, Ukraine is also being hit by wave […]

Corporate email server breach – activities of Squirrelwaffle

An email server breach at Microsoft’s Exchange servers was detected by a security firm. A threat actor has infiltrated Microsoft […]

A phishing attack through spoofed Amazon orders

This phishing attack takes brand impersonation to the next level. Not only has it baited victims with spoofed Amazon orders, […]

Statistics to prepare you for cybersecurity in 2022

Everyone was just waiting for the calendar to turn on 31st December 2021, because we needed the fresh start that […]

The biggest internet scams – and how to stop them

Phishing is a popular internet scam that has been claiming victims by the millions every year. It is often a […]

New Emotet campaigns disrupting mailboxes

The Emotet malware seems to be back from its 10-month vacation. Mid November, new Emotet campaigns were discovered, along with […]

Official FBI email servers hacked

An unidentified hacker group managed to get official FBI email servers hacked, on November 13th. With this illicit access, the […]

KYC registration agency gets vulnerability alert

An independent team of security researchers have identified a vulnerability in the software used by a Sebi-registered KYC Registration Agency. […]

Cyber incident highlights of 2021

Preparing for a secure 2022 We walk down memory lane today to inspect the most noteworthy cyber incidents of the […]

India’s biggest demat depository breached

Central Depository Services Ltd. (CDSL), a security firm liaised with the Bombay Stock exchange (BSE), National Stock Exchange (NSE) allegedly […]

Omicron phishing attacks already started

Back when Covid-19 had started spreading around the March of 2020, we had already expressed our disgust at how cybercriminals […]

TodayZoo phishing kit creates the Franken-phish phishing monster

A bizarre phishing campaign is afoot, using a tool called as a phishing kit to steal passwords. What’s so strange […]

SBI customers lose money to a novel bank phishing attack

Several customers of the State Bank of India have started filing complaints of losing their account money. The incident, which […]

Do your best work with Microsoft 365 Solutions

Microsoft 365 is here to provide the best integrate experience for your productivity and collaboration. Bring out your best in […]

Russian threat group after 14,000 Gmail accounts

A Russian-linked hacker group, APT28, purported to have been on a month-long phishing rampage, targeting Gmail accounts. According to Google, […]

The 7 worst data breaches of 2021

Because every business is now online, it generates plenty more data than it used to previously. Naturally, it needs to […]

Ransomware trends in 2021

Ransomware attacks have been on a steady rise in 2021, both in number of ransomware attacks and also ransom amounts. There are trend shifts also in […]

Ransomware attacks rise by 64%

Between August 2020 and July 2021, there has been a 64% increase in ransomware attacks. Cybersecurity researchers analysed 121 ransomware […]

GoDaddy data breach – data of 1.2 million customers at risk

A popular web hosting provider and domain registrar, GoDaddy, recently fell prey to a serious data breach which led to […]

Indian organizations face rise in cyber security attacks

Several organizations in India, belonging to an eclectic group of industry sectors have recorded an increase in cyber security attacks. […]

Bank data breach costs RS 29 crore

The renowned SVC bank has registered a cyber case of criminal breach of trust and data compromise against its own […]

Azure network security – reduce cost and risk

With the surge towards cloud computing, more and more organizations are shifting their applications and computing to the cloud. This […]

5 security benefits of Next Gen Firewalls (NGFW)

An NGFW is a staple part of any security fabric today because it’s built to protect cloud data and network […]

US DoT impersonation leads to massive 2-day phishing scam

As we continue arming ourselves and helping companies arm themselves against modernized cyber threats, cases like these make us realize […]

Become a part of NCSAM 2021

Being #CyberResponsible With NCSAM 2021 Every year, October is celebrated as National Cyber Security Awareness Month (NCSAM). This year more […]

How Cisco endpoint security offers enhanced protection

With the introduction to cloud technologies and remote collaboration, there was a pressing need to move away from traditional antivirus […]

4 data protection tools for your small business

Any business today generates heaps of data, a majority of which is confidential. No matter the size and scale of […]

Benefits of Zoom for small businesses

Zoom offers the most features for remote collaboration, at the most feasible prices. The best thing about Zoom is its […]

Microsoft 365 Security in the Cloud

Along with dependable protection, Microsoft 365 Security solutions now bring a much-needed component to your security arsenal: integration. Microsoft 365 […]

Accenture in the crosshairs of Lockbit ransomware attack

A well-known consulting firm, Accenture, has fallen prey to a ransomware attack by the infamous Lockbit group. The Lockbit ransomware […]

Cisco Secure Email cloud mailbox – simplified email security for small businesses

When it comes to email security, small businesses especially have to follow the ‘Do It Right the First Time’ mantra. […]

Email archives VS email backups

Hassles of email management The volume of email data a business generates is humongous. This can cause problems of storage […]

Blocking bots – The role of an Advanced WAF

These days, we don’t go online. We are online. All the time. Especially with a majority of the population working […]

Microsoft Teams Essentials – bringing progress closer to you

Collaboration is the demand of today and is an essential part of business growth and productivity. Today, team members are […]

5 business benefits of Cloud-to-Cloud Backup

Barracuda recently undertook a global IT survey to address the changing needs of remote collaboration, cloud computing, cloud data security, […]

The State of Office365 Backup – Barracuda’s Cloud to Cloud Backup

Research in recent cybersecurity and IT trends has demonstrates that the shift to remote work and offsite collaboration has intensified […]

Fortify your security with Microsoft Security Solutions

Microsoft Security Solutions are here to provide greater security but at a lower cost. With these solutions, you get the […]

Widespread Ransomware 2.0 attacks

Last year saw a hike in not just the number of ransomware cases, but also in the variations of a […]

Government domains breached – official government data at risk

Government officials are under threat of a phishing campaign as ids of official government domains such as @nic.in and @gov.in […]

India faces 213 weekly ransomware attacks

Following the 2020 email hacking riot, 2021 did not let us off easy. More and more emails are being targeted […]

Remote Access Trojan – Your Passwords at Risk

A new variant of an old trojan has now been activated, putting passwords and Windows PCs at risk. The Remote […]

Security Threats in Banking and How to Handle Them

Security threats in banking are becoming much more dangerous. Especially considering how varied and deceptive they have become. Food for […]

Reasons India Needs Better Cybersecurity in Banking

Banking in India is a very structured and regulated. Banks realize they’re dealing directly with citizens’ hard-earned money and take […]

Effective Endpoint Security

Endpoint security is a tricky subject, especially considering all the many devices that communicate within and outside a network. Add […]

Adaptive Cloud Security & Why You Need It

Cloud computing brought with it an “always on” world. You can work from anywhere, access your data from anywhere, collaborate […]

Office365 Phishing Scam

When your go-to productivity applications start getting caught up in phishing scams, it makes you take a step back and […]

Microsoft Email Users Fall Prey to FedEx Phishing Emails

Microsoft email users seem to be repeatedly be targeted by one phishing scam after another. One curious observation is that […]

Celsius Data Breach – Phishing Claims More Victims

Celsius, a crypto lending service, recently learned of a security break at one of their third-party service providers, leading to […]

Ransomware Attack At Realty Firm– Possible Data Loss

A realty firm called Ansal Housing recently fell prey to a ransomware attack, which resulted in possible data loss. The […]

Banking Customers Fall Prey to Phishing Scams

Sensitive banking information is always a matter of great anxiety for us and a matter of great opportunity for hackers. […]

Exchange Email Hack

The Rampage Continues Vulnerabilities in a major player’s server architecture is an open invitation to hackers; once a group successfully […]

Growing Concerns of Credential Theft Cases

Deep research into cyber security threat patterns has revealed some trends in hackers’ behaviour that are worth noting. Studies show […]

What is an SSL Certificate and why is it important?

Why worry about an SSL Certificate? There are a lot of little things that come together to give your online […]

EU Banking Regulator Victimized by Microsoft Email Hack

Major Financial Institution Compromised The European Banking Authority, one of the foremost European financial regulators, recently declared it had fallen […]

4 New Hacker Groups Target Microsoft Email Servers

After the focused attacks on Microsoft email servers by alleged state-sponsored hacking groups (known popularly as the Hafnium group), other […]

Microsoft Exchange Server Flaws Affect 30,000 Companies

A slow-burn cyber breach has been transpiring since January, only recently coming to public attention. Due to Microsoft Exchange server […]

Hackers Target Government Officials Through Rogue Email ID

Several officials in the government were targeted for phishing through a rogue email ID. These government officials were spread out […]

Getting a bonus is always good… unless it’s an advanced Bazar Trojan in disguise

Security researchers have found a deadly variant of a Bazar Trojan that grabs control of your machine and cedes it […]

Hosting Provider Phishing Scam

Cyber criminals will often use scare tactics to prod their victims into interacting with their phishing links and malicious programs. […]

What is Cloud Security & Why Do You Need A Cloud Firewall?

The advent of cloud computing gave rise to hyper connectivity and constant availability. Data could not only be stored on […]

SitePoint Security Breach

SitePoint is an online portal which provides some great tutorials on web development. It recently went through a security breach […]

Office365 Email Compromise – SolarWinds Faces Security Breach

SolarWinds, an IT services company, recently faced issue with their email security. Sudhakar Ramakrishna, CEO SolarWinds, suspects a zero-day vulnerability […]

Server Hack Costs 1.5 Crore in Losses

Case Specifics A private company based in Pune recently suffered from a server hack. The hackers, who remain as of […]

Malwarebytes Hacked by The Same Group Behind SolarWinds Security Breach

Cyber security firm themselves are lucrative targets for hackers. It is a matter of pride for them; their way of […]

Common Cyber Attacks You Should Know

It is true that most common cyber attacks leverage gaps in technical devices or technological aspects a business uses, to […]

Haryana Hackers Steal INR 1 Crore

Haryana hackers defrauded ISGEC Heavy Engineering company and nicked an amount of INR 1.05 crore. These hackers intruded upon ISGEC’s […]

Microsoft Fails to Block O365 Email Spoofing Attacks

Microsoft is under the gun again for cyber fraud. 200 million+ users are at a risk of O365 email spoofing […]

What are the types of Network Security Devices?

In a previous blog, we explored various concepts associated with network security. If you haven’t already, we highly recommend reading […]

Understanding Network Security

Communication to and from devices essentially happens via networks. That network can be private (within an organization) or public (via […]

Features of Cisco Email ATP

Cisco provides one of the strongest email security solutions available today. In our blog on Cisco IronPort offering, we discussed […]

Web Security Assessment Services by Logix

Your website is your gateway to the online world. Its performance, freshness, and quality represent the authority of your brand. […]

Your Guide To Prevent Phishing – Know How Hackers Think

Cyber criminals are getting creative with their ways and organizations have to lookout for new ways to prevent phishing attacks. […]

Pune-based Engineering Company Duped Out Of 50 lakhs

It’s cyber fraud cases like these that remind us of the gravity of cyber security. A Pune-based engineering company, with […]

Why you shouldn’t ignore email security in 2021

We can all agree this year has been a roller coaster ride. Almost everyone has had to adapt to some […]

Looking to migrate Zimbra to Office 365? There’s a better alternative to upgrade: Zimbra + Office 365 Hybrid

Zimbra is one of the leading email collaboration solutions in the market. It is a robust, flexible and affordable mailing […]

Prevent Social Engineering Attacks

This is the final part in our on-going series on social engineering. In this blog, we give you methods to […]

5 Social Engineering Attacks You Should Know

This is Part Two of our 3-part series on Social Engineering. In this blog, we discuss 5 social engineering attacks you […]

What Is Social Engineering?

When it comes to cyber-attacks, our thoughts jump immediately to malicious code and the misuse of technology. However, the success […]

Your Office 365 Credentials Are Vulnerable To This MS Teams Phishing Attack

It is time you should probably review the safety of your Office 365 credentials. Recently, Microsoft Teams was targeted for […]

This Pharma Lab Data Breach Caused Multiple Plants to Shut Down

A successful data breach at Dr Reddy’s, a well-known pharmaceutical company, caused a total shutdown of multiple laboratories and plants. […]

These two companies are favourites for spoofed emails

A quarterly report for cyber statistics has stated that two companies in particular have become go-to targets for spoofed emails. […]

Business Email Compromise: A Complete Guide

Email has become an inseparable part of any business. Sending invoices, making major decisions, updating your clients, scheduling meetings… all […]

Why Web Application Firewall Is a Must In Your Security Arsenal

If your organization is cyber aware, you doubtless have procured some services and tools for your network security. As more […]

Credentials Theft: A Case Study

Cyber criminals keep creatively upping their game and this new phishing attack is proof of that. A new worm phishing […]

Major Data Breach of Government Computers

The National Informatics Center (NIC) and the Ministy of Electronics & Information Technology (MeitY) suffered a data breach in early […]

Look out for Covid-19 Related Cyber Scams

While regulations have lifted the restrictions of strict lockdowns, common sense and the growing number of Covid-19 cases suggest otherwise. […]

Email Invoice Fraud Prevention – A Concise Guide

Business owners are now growing increasingly aware of cyber security concerns hanging over their heads like a dark cloud. That […]

Logix is a Microsoft Gold Partner in India

What are our offerings as a Microsoft Gold Partner? For some time now, the corporate sector has been all about […]

Nykaa Email Spoofing Case

Nykaa Loses 62Lakh To Cyber Fraud Most of the times, it is the individual shoppers and customers who are at […]

4 Ways Fraud Invoices Can Affect Your Business

Why Worry About Fraud Invoices? Fraud Invoices could victimize any business. Invoice fraud is a type of attack in which […]

4 Factors To Consider When Choosing Between Email Archival And Deletion

Is Email Archival Better than Email Deletion? Every business relies on email correspondence to some level. But as the volume […]

Microsoft Office 365 Partner Mumbai

Cloud Email Security Vs Advanced Threat Protection

Logix Infosecurity : Microsoft office 365 partner in Kolkata

If you are looking for Microsoft office 365 partner in Kolkata, your search ends here with us at Logix Infosecurity […]

If I have an Anti-Virus, Do I need a firewall?

Well, Antivirus and Firewalls are both designed to keep your system safe but these two are fundamentally different and complementary […]

Save Disk Space and Improve Performance with Zimbra 8.8 HSM Technology

With Zimbra 8.8 HSM technology you can easily compress items and save precious disk space. This option can be easily […]

The Value of Mass Email Marketing Tools

What is the value of Mass Email Marketing? If you’re a business owner, one of your constant ambition is doubtless […]

Fraudster impersonated a prominent bank’s email domain to commit fraud

Bank’s Email Domains Impersonated to Commit Fraud Against Prothious Engineering Services An Engineering Service company called Prothious Engineering Services, became […]

The Threat Of Business Email Compromise

Business Email Compromise Becomes the Most Common Cyber Attack Webinars are part of the ‘New Normal’ which has settled everywhere, […]

Tax Accounting Software Spoofed

Tax Accounting Software Misused for Phishing Scam, CEOs Under Threat A multi-national cyber organization has uncovered a large-scale cyber-attack, which […]

9 Email Threats You Should Prevent

Why worry about Email Security? Email is the entry point for a maximum number of cyber threats. An email attack […]

The Free Covid Testing Phishing Scam

A Major Phishing Campaign Is Coming Your Way, Promising Free Covid Testing As the government dips its toes into opening […]

GSuite – Cloud Zimbra Hybrid Solution

Logix’s G Suite – Cloud Zimbra Hybrid Solution Any business needs mail servers to streamline their electronic communication. A powerful, […]

Mumbai Firm Loses 1.6CR to a Dodgy Invoice

Dodgy Invoices On The Rise Yet another case of a dodgy invoice causing massive monetary losses has come to light. […]

The Fake HR Email Phishing Scam

Work from Home may have become tiresome; but don’t let your guard down just yet India embarks upon a new […]

The Aramco-ONGC Fake Invoice Case

Fake Invoices: The New Monster Indian Companies Have to Face? As we launched our new service, Email Auto Protect, we […]

This New Phishing Scam Contains A Password Protected File

The Password Protected File: Added Security or Phishing Attack? A new phishing campaign has been active and it is a […]

Logix Launches A Unique Service to Fight Against Invoice Fraud

Secure Your Billing Process From Invoice Fraud Invoice Fraud is a type of cyber attack which is fast gaining notoriety, […]

The Phone Provider Phishing Scam – What is it and how to prevent it?

Don’t Trust Those Emails from Your Phone Providers In this age of ransomware and Emotet botnets, old-fashioned spear phishing attempts […]

Office 365 and Cloud Zimbra | Hybrid Mail Solution

Logix’s Hybrid Collaboration Solution: The Power of Two Giants at Your Disposal Collaboration is the buzzword of today’s world. Remote […]

Cyber Attack Cases Rocket During The Pandemic

Cyber Attack Cases Grow at A Worrisome Rate During the Pandemic The fight against the COVID-19 pandemic has been very […]

This Email Extortion Campaign Is Demanding Fake Ransom

Phishers resort to perverted email extortion Internet users beware. There is a new phishing campaign that is making the rounds […]

10 Steps For Ransomware Protection

It is uncanny, the resemblance of a ransomware’s working to the ongoing lockdown. Just like we are connected and yet […]

Cyber Cell Recovers Rs 65 Lakhs Lost To Invoice Fraud

Cyber Cell Recovers 65 lakhs Lost To Invoice Fraud With all the negativity in the news, it is cheering to […]

Delhi Police Imitated For Phishing Campaigns

The Enforcer Becomes the Victim It is a mark of shameful arrogance when cyber criminals pose as none other than […]

Fake Invoices: How is the Emotet Botnet Attacking Financial Sectors?

The Emotet Botnet Continues Its Rampage By Spreading Fake Invoices This is the second blog this week centred around the […]

Ransomware Strains In the News Again

Talos Incident Response Talks About New Ransomware Strains In a previous blog, we talked about how ransomware can be the […]

Operation TA542

Operation TA542: Emotet Resurfaces This botnet has been ping-ponging back and forth, claiming victims in large numbers and then vanishing. […]

Newsletter from Reserve Bank Information Technology Private Limited (ReBIT) on Cybersecurity

An article shared by Mr. Nandkumar Saravade, CEO, ReBIT in Cyber Pulse Newsletter brings up the development in the cybersecurity […]

You’ve Won An Award: Is It Really Just Good News In That Celebratory Email?

Congratulations! You have won … a free phishing scam! Everybody loves to get recognition for their work. Even better if […]

Tree Sena: An Unfortunate Cybercrime Case That Affected A Noble Cause

Tree Sena: A Sad Case of Identity Theft The scenario revolving around Aarey Colony and the metro is going through […]

Watch Out! Public Health Group Officials Being Imitated For Phishing Campaigns

Public Health Group Officials Imitated for Sending Out Phishing Emails We have already covered Coronavirus Phishing Ruses in a previous […]

Corporate Email Eavesdropping: Is Someone Spying On You?

A Mysterious Hacker Group Has Been Spying on Corporate Email and FTP Traffic We have discussed in an earlier blog […]

The Google Calendar Spam: Something you need to know?

Google Calendar Falls Prey to Spammers  A rather unique spamming technique has been making headlines. Spammers are now gmail users […]

Multi-Factor Authentication: The Devil Is In The Details

Hackers attacked more than a million Microsoft Accounts ! If you need any more affirmation that your organisational security is […]

Coronavirus Sparks A Series of Phishing Ruses

Curb your instincts; don’t open emails just because they claim to contain news about the Coronavirus pandemic. We have already […]

Coronavirus Forces Employees to Work From Home. But What About Remote Security?

Covid-19 Outbreak forcing you to work from home? Here are the best security practices you MUST follow for maximum security. […]

Microsoft Office 365 and Google G Suite Become Hot Targets for BEC

FBI Reports Suggest BEC should be treated as seriously as Ransomware For businesses, the resource that needs to be protected […]

COVID-19 Sparks A Series of Phishing Attacks

Cybercriminals exploit the mass epidemic of COVID-19 Times are tough all over the world. The wide outspread of the Coronavirus […]

Fortinet Product Launch

Fortinet Launches A New Line of Firewall, and its Features are Super Impressive Fortinet has always been a forerunner in […]

Ransomware Delivers A Gut Punch To A Texas School District

Ransomware: The most damaging malware? The exact magnitude of a malware attack is difficult to estimate. It depends on what […]

Conversation Hijacking – The Latest Sneaky Phishing Technique

All About Conversation Hijacking One of the biggest yet age-old perils of technology is the theft of user data and […]

Using Artificial Intelligence To Battle Email Phishing

Artificial Intelligence: A possible way to go when it comes to Email Phishing The purpose with which email was so […]

Cyber Attacks Take A Toll On Business

Cyber Attacks become the most feared threat to businesses If you are a business owner, you already know starting a […]

The Disturbing Cybercrime Statistics in India

Cybercrime Statistic Reports Paint A Worrisome Picture Cybercrime statistics for 2019 have been publicised, and the statistics are definitely not […]

Subject Lines Used For Phishing Bait

Subject Lines That Are Most Frequently Used as Bait We have been advocating email security very eagerly since we work […]

The TrickBot Trojan Resurfaces

 TrickBot Trojan Steals Data from the Windows Active Directory The TrickBot Trojan, a banking malware that earlier targeted the Windows […]

Preventive Techniques Against Spear Phishing

5 Tips to Avoid Spear Phishing An energy company in Ukraine called Burisma recently became the unfortunate victim of a […]

DeathRansom Evolves Into A Threatening Situation

DeathRansom – A New Strain of Ransomware Causes an Outrage A malignant strain of ransomware called as DeathRansom is causing […]

Machine Learning Scam Targets Google Search Results

Google Algorithms Targeted for Manipulating Search Results The world wide web has adjusted its working to a lot of fancy […]

Chandigarh Lawyer Tricked Out of ₹3.6 Lakhs

Fraudulent Email Causes Massive Loss Of Money It’s incidences like these that make us double our efforts and provide our […]

Young Techie Creates An Android App That Can Spoof Emails

Dangers of the Email Spoofer App App-savvy people beware. A new app is on the market that can launch a […]

Popular Scams Perpetrated Through Security Breach

The Biggest ‘Cyber Heists’ of the Century Although we wish for the internet to be a safe place for our […]

Data Protection Law Ushers in a Positive Change

An update on the data protection law December brought in some good news as a hopeful end to 2019. With […]

Fake Greta Thunberg Email Spreads A Dangerous Malware

Fake Greta Thunberg Emails Used to Ensnare New Victims Stories of brave individuals fighting for the overall betterment of our […]

DNS Protection

Protect Your DNS – How & Why? DNS or Domain Naming System is a computer server which accommodates public IP […]

Ransomware Causes 300 People To Lose Their Jobs

Ransomware Forces An Organization To Let Go Of 300 Employees Ransomware has been known to cause a lot of monetary […]

Emotet botnet malware hidden within fake Christmas party invites

Beware: Your Christmas party emails could be infected with malware Nobody likes downers when it comes to the holiday spirit. […]

Microsoft Report on Cleverest Phishing Tactics

Microsoft Reports on the Cleverest Phishing Tactics of 2019 While for individuals it is frustrating — and threatening — how […]

Best Practices For Online Security

Security Practices for Your Business — How many can you check off your list? When it comes to online security, […]

Ukraine Targeted by a Russian APT Hacker Team

Russian APT Hacker Team Strikes Out The Military and the Government are under the gun once again. The country of […]

Defence Ministry Targeted For Phishing

Warning Issued for Defence Personnel The defence ministry has issued an emergency warning to all defence personnel not to open […]

Most Likely Phishing Targets

Organizations Most at Risk of Phishing Phishing is a rapidly damaging cybercrime that has targeted a wide variety of domains […]

Corporate Email Hijacking

Corporate Email Hijacking: Know how it’s done Businesses contribute heavily to the email traffic flowing across the internet. Corporate email […]

Protection Against Online Scams

Guidelines to protect yourself against cyber-scamming Digitisation has seeped into virtually all aspects of our interactions, from virtual copies of […]

Cybercriminals target Windows 10 Update through Fake Emails

Ransomware targets Windows 10 Update TrustWave SpiderLabs security researchers have uncovered a malware that is bound to claim lots of […]

Beware – A Phishing Attack through IT Refund Message

Smishing, a variant of phishing, attacks through SMS usually target individuals or organizations, it imitates an identity of a legal […]

Fake voicemail notifications targetting credentials

Fake voicemail notifications aid scammers to collect Office 365 login credentials Heard of phishing attacks? There’s been an update! They […]

Phishing goes beyond email

While phishing expands its horizons, should your security? Expanding its customer base is one of the key strategies that a […]

The Dangers of Identity Theft

Identity Theft – what and how to stay safe? With cloud storages and online platforms growing stronger by the day, […]

Third Party VPN services under threat of attack by the infamous APT5 Team

VPN Compromised — Are you Safe? State sponsored hacking has been around for ages. It occurs when a nation’s government […]

Checkpoint Security reports a shocking rise in Sextortion Emails

There’re no lines cybercriminals won’t cross. Now they’ve resorted to sextortion! Malware was always a poisoned bit of coding A […]

FakeNarrator Malware launches an all-out attack in the South-East Asian region

Beware of FakeNarrator Malware Accessibility and Productivity play a key role in ensuring smooth functioning of any organization. Any service […]

NCSAM – Where Industries and the Government team up to raise Cybersecurity Awareness

It’s National Cybersecurity Awareness Month NCSAM is an internationally acclaimed awareness drive celebrated to promote the growing importance of cybersecurity […]

The ABCs of Malware – An informative Blog Series (Part 3 of 3)

All About Malware – Safeguarding Against Malware This is Part Three of the Three Part Series of Malware Blogs.  Till […]

The ABCs of Malware – An informative Blog Series (Part 2 of 3)

All About Malware – Types of Malware This is Part Two of the Three Part Series of Malware Blogs. A short recap of […]

The ABCs of Malware – An informative Blog Series (Part 1 of 3)

All About Malware – Introduction & Working This is Part One of the Three Part Series of Malware Blogs. Malware […]

Amazon Prime Phishing Scam – Don’t fall for the “Account Frozen” Act!

Don’t Panic Online Shoppers, Amazon Prime is NOT Locked If you’re an Amazon Prime Member, you might have received an […]

Vloggers Under The Threat Of Phishing

Vloggers- the latest victims of phishing attacks Phishing attacks are not only getting more sophisticated but they are also expanding […]

The two branches of Phishing: Vishing and Smishing

Phishing gets two new neighbours, and they are just as deadly Phishing, which is the theft of information through fraudulent […]

Malware In Fake Income Tax Emails

Beware of Malware – It could be hiding in imposter income tax return emails! The internet has enabled individuals and […]

Machine Learning: A Protection Against Spear Phishing

How Machine Learning can help to protect your inbox from Spear Phishing Email is the easiest medium for malicious attackers […]

Rise in Phishing Attacks

Cyber Criminals Are Circling the Phishing Pond Cyber security surveys suggest that phishing is the most common type of online […]

Formjacking Attack And How T Protect Yourself From It

Are you under an invisible attack? “Who would be interested in stealing data from someone like me?” he said and […]

Imperva Hacked

Imperva Hacked: API Keys, SSL Certificates Stolen Based in California, USA, Imperva offers Cybersecurity software and services designed to protect […]

MS Word Trojan Malware out to steal your information

Alert: This Trojan Malware aimed at stealing bank details and personal information is spreading via infected Word documents. Which Malware? […]

Cyber-security is the linchpin for your business

Cyber Security in the era of Internet-of-things is a changing paradigm. According to recent study by Gartner, more than half […]

Microsoft TSO Host Tussle

An Overview A Web Hosting Service typically provides technologies and supplies at cost which enables your website to go live, […]

Ransomware: An insidious, evolving Threat

Ransomware is considered one of the most dangerous threats to organizations across the world. Malware authors are developing new malicious codes […]

Microsoft warns Users of phishing attacks using custom 404 Pages

Microsoft Security researchers discovered an unusual phishing campaign replicating their Microsoft login page designed to look exactly like Microsoft’s official login […]

India’s IoT Deployments suffered 22% more cyberattacks in Q2

IoT deployments in India received the maximum number of attacks from a few geographies in Central Europe. These attacks were […]

Whale Phishing has risen to be a major cyber security threat

A whale phishing attack is a specific type of phishing attack that targets high-profile employees, such as the CEO or CFO, in […]

Top 3 cybersecurity threats of 2019

Cybersecurity has risen ever higher up the corporate agenda for the very good reason that incidents and breaches result in […]

Coping up with evolving priorities and challenges of CISOs

With the increasing cybersecurity attacks the role of CISOs have evolved drastically from their roles 20 years ago. CISOs have […]

FlawedAmmyy RAT Malware Attacks even patched windows Users, Beware!

Always be cautious while opening email attachments. Recently, hackers have been sending weaponized Excels containing malicious malware FlawedAmmyy RAT, reported by […]

Visa Contactless cards are prone to big frauds

Hackers have found new ways to bypass the payment limits on Visa contactless cards. The attacks could  steal unlimited sums from accounts, […]

Make your employees your Strongest link in Cyber Security

Your company may be using the latest software, hardware and other resources to protect against cyber security threats but unless […]

American Express customers targeted by Novel Phishing Attack

American Express customers were targeted with a Novel Phishing attack for stealing customer credentials. The scammers targeted both corporate and […]

Why SMBs are at higher risk of cyber attacks?

Due to the lack of a dedicated cyber security staff for detecting and responding to cyber attacks, SMBs are particularly […]

80% of companies lack DMARC policies against spoofing!

DMARC is a technology advancement in preventing email and domain spoofing. Inspite of being industry standard, 80 % of companies […]

Agent Smith Virus infected 1.5 crore devices in India

Do you see an ad popping up when opening Whatsapp? Then you are a victim of Agent Smith Malware.A newly […]

Top 5 tips to stay safe from phishing scammers

Email Spoofing and Email phishing attacks are more rampant than ever. Phishing Emails flow right into your Mailbox all around […]

Hardly 50 % of Fortune 500 companies practice email security using DMARC

In a recent survey conducted by Agari, it was discovered that just half of the Fortune 500 have deployed DMARC — or […]

Increasing cyber attacks calls for increased security audits within IT companies

Indian IT companies did not give high priority to cyber security but the increased number of cyber attacks have lead […]

RBI declares localisation of Payment Data Storage

The Reserve Bank of India (RBI) on Wednesday declared that all data related to payments must be stored in India […]

Analyzing World’s Top Cybersecurity breaches of 2019, so far

How safe is your organization? Data breaches are happening more often than ever exposing all the highly sensitive personal information. […]

Whatsapp to take legal Action against App Misusers and Spammers

Whatsapp has announced that it will take legal action against individual and companies sending bulk messages in violation to its […]

Increasing Abused Emails – How bad is it for your company’s brand repute

On an average 75 % of the bulk emails reach the Inbox of the intended recipient, according to an Email […]

Defending the New Generation phishing attacks

Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal […]

Are we still lagging behind the attack vendors? Stack Overflow and Canva attacked by hackers!

Last month, 2 major data breaches took place showing how companies are lagging behind in fulfilling the attack vectors. Its […]

Andheri Advertisement firm looses 12 lakh INR to cyber criminals

An advertising company in Andheri was cheated of Rs.12 Lakh in a ‘man-in-the-middle’ attack.  A man-in-the-middle attack allows a malicious actor […]

Office 365 users combat targeted phishing attacks better with Cisco’s Email Security

Microsoft Office 365 has become the most widely used e-mail service in the market. Being the most popular and most […]

India ranks second in cyber attacks with 38 attacks per second

India is a country with the second-largest number of account take-over logins – close to 1.38 lakh login’s per hour […]

Top 7 tips to prevent Email Phishing and Email Spoofing Attacks

Email Spoofing and Email phishing attacks are more rampant than ever. Phishing Emails flow right into your Mailbox all around […]

Ransomware hits Telangana and AP’s power utilities

The websites of Telangana State Southern Power Distribution Company Ltd (TSSPDCL) and its AP counterpart encountered a ransomware attack a […]

Dark Web Exposes Computer-Server Data Transfer to Hackers

As startling as it may sound but cybercriminals now have access to the most-secured data files used to facilitate confidential […]

IMAP is the most exploited protocol. Office 365 and G Suite cloud accounts hacked

One thing leads to another like a domino, with access to leaked credentials dumps, the speed and efficiency of brute-force […]

Why should government entities adopt DMARC? And help get rid of suspicious emails!

If you think confirmation of name of the sender of the mail is enough to assure its genuineness, think again! […]

Logix SupportDesk Android App- Providing 24 x 7 support to all our customers

We believe in serving our customers without any delay. In order to provide complete and unhindered support to our 2200+ […]

In the Tax Filing Season, beware of phishing attacks

Beware of email phishing attacks from hackers while filing your Income Tax Returns. In email phishing attacks, hackers smartly replace […]

Ryuk ransomware Attack on Jackson county fetches hackers a whopping $400,000

The entire computer system of Jackson County, Georgia was hit by a massive Ryuk ransomware attack on March 01. Authorities […]

Beware of Income Tax Returns Email Phishing Hack

Beware of email phishing attacks from hackers while filing your Income Tax Returns. In email phishing attacks, hackers smartly replace […]

Beware of the increasing bank phishing frauds

All the banks are regularly advising their customers daily for being aware of the increasing phishing frauds by cyber criminals. […]

Spear phishing is on the rise in 2019

One of the most dangerous and highly successful type of cyber attacks is spear phishing attacks. This is a highly […]

Latest cryptomining malwares uninstalls cloud security software

This is a new bread of malware! A very new malware is seen accomplishing never before seen function – uninstalling […]

The power of design in the startup ecosystem

The reason many tech companies fail is not a bad product/market fit, the wrong technological approach or lack of experienced […]

Web applications: new back-doors to access private data

Multiple rogue web applications can be used to attack vulnerable browser extension and exploiting private data becomes easier for adversaries […]

Important cybersecurity statistics for 2019

Digital economy is growing everywhere in the world. Technology is changing our livelihoods in unprecedented ways. We cannot imagine life […]

4 things you must know about Cyber Security in the era of IoT

Cyber Security in the era of Internet-of-things is a changing paradigm. According to recent study by Gartner, more than half […]

Chinese hackers swindles Rs. 130 crore from an Indian arm of an Italian company

A Chinese hackers team stole 18.3 million dollars (Rs. 130 Crore) from the Indian arm of Italian company Tecnimont SpA by […]

Aadhar Card Data Leak calls for better cyber security!

Aadhar Card data of 130 million as well as bank account details have been leaked. A study published by Centre for […]

5 cybersecurity question every CIO must ask in 2019

There has been a far greater responsibility on the Chief Information Officers(CIOs) to understand the challenges, solutions and trade-offs in […]

Widespread Apple ID Phishing Attack Pretends to be App Store Receipts

This is big, the Apple-ID which managed to stay away from compromises is under attack. A notorious phishing campaign is […]

Are the e-commerce sites cyber-safe?

Can there be someone else in your shopping cart? Well, the scenario does sound scary but it might very well […]

Economic Impact of DMARC for companies across the globe

What is DMARC? DMARC is a security standard which allows a domain to declare a policy of how it wants […]

Concerns of SMBs on DMARC

DMARC (domain-based message authentication, reporting and conformance) has been gaining traction over the past couple of years. Organisation familiarising themselves […]

Half of the Phishing sites trick users by displaying the green padlock!

Phishing has always been hackers favorite act. It allows them to make multiple rewards after they succeed. Not only it […]

Business e-mail compromise (BEC), the new service which has takers!

For as low as $150 you can get the credentials for an email account. Hackers in some advert claim the […]

Increasing Phishing attacks in India

Phishing is on the rise in the country. India is among the top 4 countries in the world for Phishing […]

Latest DNS Spoofing attacks use fragmented datagrams. Can you avoid it?

With a little attention, as it turns out, one can spoof fake DNS responses using fragmented datagrams. How is it […]

Prevent the Fileless Attacks for your Windows PC

What is a Fileless or non-malware attack A non-malware attack is one in which an attacker uses existing software, allowed […]

India witnessed over 4.36 lakh cyberattacks in the first half of 2018

India ranks 21st in the global tally with 6,95,396 attacks hackers across various countries. However, India took the 13th spot […]

Ransomware Action Plan for Indian Businesses

Sometime in May last year the world woke up to the menace Ransomware can cause. Corporations were caught unaware of […]

Penetration Test vs Vulnerability Assessment. Choose wisely, stay protected.

It is definitely surprising that most people take penetration testing for vulnerability testing and vice-versa, sometimes even forego one for […]

10 warning Signs of malware on your system

There are innumerable amounts of malwares lurking around the internet. Do you think one single anti-virus can protect you from […]

2 million network storage devices affected by unpatched zero-day vulnerabilities!

Network storage devices (NAS), are critical for small and medium businesses as it adds to the extra storage space when […]

Facebook’s massive Data breach: what you need to know

The worries for facebook do not seem to stop with cambridge analytica and this time around it’s a massive data […]

Business is better with Microsoft Office 365!

Smart Strategies for an end-to-end network security

Network is the lifeline of any operating business. Almost 99% of the work is done using machines, connected in some […]

India Inc desperately needs to upgrade its cyber security- know why?

There has been a massive push from the government to digitize the payment, use Aadhar number with more transaction, job […]

How can you save your business from being the next hacker’s destination with VA?

Periodic Vulnerability assessment can be a strong step in the entire effort to keep business away from cyber-attacks. It can […]

New Phishing Attack , old trick. Steals Login And Payment Data

Phishing is old hacking trick, but is still very lucrative and works wonders if it succeeds. This time around the […]

Protect your Domain reputation with DMARC

Today the world is highly connected. People recognize brands more so than ever before. In our highly connected world, domains […]

5 common Cybersecurity mistakes that can put you in jeopardy

Cyberattacks, data breaches are amongst the most pressing problems CISO face across the companies (small, medium or large) around the […]

How much is “enough budget” for cybersecurity?

As the year comes to an end, now is the time to start preparing for budgets and fighting for departmental […]

5 biggest threats for CTOs in 2018

Nations run on digital infrastructure. Fire-sale, from the Die-Hard movie reminds of the possibilities of terrorist or well-funded criminal attack […]

How will AI change cybersecurity by 2023?

Codes are evolving, so are malware. Attacks have become more fluid, more sophisticated as they start with little unnoticeable things […]

Hospitality Sector Under the threat of AdvisorsBot malware

A new malware downloader, AdvisorsBot, has been spotted affecting hospitality sector via email campaigns. It is being hosted by a […]

World’s largest companies have adopted to DMARCs reject policy

Large companies across the world receive phishing emails every day. There are a number of these companies who are still […]

Cyber security basics are must for all. Be it Sales, HR or Engineer!

All the departments of the organization have access to different kinds of sensitive data. It is their responsibility to protect […]

Cyber criminals siphoned Rs 94 crore off a co-operative bank in Pune

Cyber criminals stole over Rs 94 crore from a Pune headquartered Cosmos Bank. The money was allegedly transferred to accounts […]

Mitre ATT&CK Framework: A boon to your company’s Red Team

The MITRE ATT&CK Framework has become increasingly popular over the last few years. It was originally developed to support Mitre’s […]

CFOs need to work closely with CIOs to stay Cyber Secure

2017 was an eventful year with high profile data breaches and notable cyber criminal activities. 2018 doesn’t look any comforting […]

Are your website images secured?

Malware can enter your machine through corrupted images on any website. Malware is stored in Exchangeable Image File Format (EXIF) […]

Why you must switch to HTTPS right now?

It is high time to switch to HTTPS. The most important question lingering here is Why to move to HTTPS? […]

Avoiding the rising DNS Binding Attacks for the smart devices

What is a DNS Rebinding Attack? DNS Rebinding Attacks are where the attacker tricks the user into binding with malicious […]

FelixRoot Backdoor Malware Resurfaced in a recent Campaign

Felixroot Backdoor was first spotted in September 2017 in Ukraine spreading through pernicious banking documents with macros downloading the back […]

Is implementing DMARC a cake walk or a tedious job?

It is a cliché in IT industry for people to judge software or a protocol even before using it. Many […]

FlawedAmmyy RAT being delivered via TA505 email spam campaigns

Always be cautious while opening email attachments. Recently, hackers have been sending weaponized PDFs containing malicious SettingContent-ms files containing FlawedAmmyy […]

Emotet Malware spreading extensively via Microsoft Documents in emails

Hackers are trying to deliver Emotet malware by attaching it to Microsoft Office document via email. Many US citizens were […]

Cloud Technology has brought in a paradigm shift in Storing Data

Cloud Computing has flourished enormously over the past few years. It has changed the concept of data storage altogether. Every […]

[Infograph] 2018 Global Cyber Security Incidents Statistics

Indian BFSI Sector needs to be prepared for upcoming data protection laws

The increase in financial crimes is not only a threat to BFSI (Banking, Financial Services and Insurance) companies but it […]

What is DMARC? Why is it important for your business?

What is DMARC? DMARC (Domain-based Message Authentication, Reporting and Conformance) is a technology advancement in preventing email and domain spoofing. […]

Bypass glitch makes Mac OS vulnerable due to improper code-signing implementation

A bypass found in third party developers’ interpretation of code signing API allowed for unsigned malicious code to appear to […]

Beware of this Top 10 most misused Domains

In the latest research it is revealed that, some of the latest TLDs (Top-Level Domains) such as .men, .work and […]

Stay protected from Domain Spoofing – Know all about it!

What is spoofing? Cyber criminal can easily impersonate or forges domains, IP or Email ids to steal confidential information . […]

How to differentiate rogue URLs from the authentic ones

How can you identify if the domain is authentic or impostor? The answer may depend on your knowledge of Domain […]

Why Blockchain may not be the elixir to internet security

Every architect, builder and designer knows that the right tool can solve the most difficult problems in a jiffy but […]

Top 3 cyber security concepts for 2018

Cyber security is taking a new turn every year. Its very crucial to stay updated with the latest cyber security […]

Maintaining Control is vital to Data Protection

It is of prime importance to any organization to identify sensitive information and control access to it. Data Protection is […]

Beware of Fake Email IDs

A lot of scams are happening via fake email IDs. Whether you are an IT employee, bank employee or a […]

Cyber Security challenges for CXO

Technology is evolving rapidly and so are the cyber risks. It is a big responsibility on the shoulders of CXO […]

Internet Explorer Zero-day “Double-kill”

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could […]

Cryptojacking Attack hits Aditya Birla Group

A big cryptojacking attack took place first time in the country last month. The target was the Aditya Birla Group […]

ODNS would be an internet security breakthrough

The DNS is essentially a phonebook for the Internet’s domain names. When any device makes the first request over the […]

Cyber criminals have discovered a new way to bypass Office 365 Safe Links

Microsoft’s Advanced Threat Protection (ATP) includes a feature called Safe Links. Office 365 Safe Links basically curb all the malicious […]

Data hacked during EPFO-Aadhar seeding

Cyber criminals seem to have hacked the EPFO data which holds information like name, Aadhar card number, bank details of […]

Smartly defining RPO and RTO for Disaster Recovery Plans

Recovery Point Objective (RPO) and Recovery Time Objective (RTO) are 2 most important parameters for a disaster recovery and business […]

Formbook Malware spreading widely by clicking Microsoft URL shortcut files in your emails

Be careful when you receive attachments to an email, it can be an entry point to Formbook Malware. Formbook malware […]

CIOs must run a customer centric business

It is high time for CIOs to run a customer centric business. In today’s world, where there are so many […]

Indian Government needs to give cyber security an equal priority to border security

Digital India is no more a dream but carving into an absolute reality. The steps taken by the government to […]

Rarog – A cryptomining Trojan is out in the wild

A malware family Rarog is out in the internet and being excessively used by the cyber criminals to execute cryptocurrency […]

Private Cloud vs Public Cloud. Making the perfect choice!

Embracing cloud technology is no longer a choice but an inevitable business move. However migrating to cloud is not an […]

Slingshot, an APT Malware making its way through routers in the Network

An APT (Advanced Persistent Threat) malware, Slingshot, attacks victims by entering via routers and gaining kernel access to control the […]

Microsoft Office 365 provides new Advanced Security Features

Microsoft Office 365 is widely popular work office suite, among the SMBs. Hence, no doubt that it has become one […]

Is blockchain the alchemy to DDoS attacks?

DDoS(Denial of Distributed Service) attack is a type of cyber attack that involves a large number of computers and huge […]

Optimizing Disaster Recovery plans to get the best results

To assume that IT disaster will not happen to your organization because of its upbeat security and support is living […]

The rising and falling cyber security trends in 2018

Current Rising Trends of Cyber Security AI/Machine Learning is picking up Artificial Intelligence(AI) has the power to learn catch up […]

Latest technology innovations affecting cyber security

Technology is building our future, there is no denying but with every new innovation comes new vulnerabilities and hence the […]

Preventive measures for the growing DDoS Attacks

DDoS(Denial of Distributed Service) attack is a type of cyber attack that involves a large number of computers and huge […]

How cloud is influencing the roles and responsibilities of CIO?

Cloud has had a gigantic effect on the software industry. And its impact on CIO’s roles and responsibilities is dominant. […]

With the increasing third party leaks, Aadhar Card systems need security reviews

Aadhar Card database is by far one of the largest government databases on this planet consisting of more than 111 […]

[Infograph] Why Data Backup is important for your business?

[Infograph] Is your data Backed Up ?

How CIO can spread cyber security awareness among the employees

Cyber security hacks and breaches have become more widespread and are more damaging now than ever before. In the previous […]

Critical takeaways for CIOs from the 2017 cyber crimes!

Cyber security of an organization has evolved dramatically over the last decade. In 2017, many such cyber security attacks and […]

Cloud based security and analytics is the key to network protection

Cloud based security and analytics is a service model in which a key element of security or data analytics is […]

Hacked email? Things you must do

So, your email has been hacked! Well this is very likely in the age of ransomware and malware attacks and […]

India is amongst the top financial markets open to Ransomware attacks!

India is growing, while economy is set to hit the $10trillion mark in a decade or so, clearly it is […]

How can Zimbra VPS enhance your Top-line

Zimbra Virtual Private servers hosting plans are highly customizable and can be scaled with your rapidly changing business needs. The […]

Are you ready to migrate to HTTPS?

With just a couple of months to go before HTTP (Hypertext Transfer Protocol) web pages being marked as insecure, are […]

5 Must Security Precautions while using third party softwares

The default Operating systems are becoming more and more resistant to attacks and hence most of the attacks take place […]

Secure your website before Google’s Chrome marks it Insecure!

Google has announced that starting in July, it will mark all HTTP sites as ‘not secure’. With the release of Chrome […]

Cloud-to-Cloud Backup Technology

Cloud technology has been growing for some time now and will become mainstream in near future. It has many advantages […]

5 things your IT Disaster Recovery Plan should cover

To assume that IT disaster will not happen to your organization because of its upbeat security and support is living […]

Leverage the Office 365 Collaboration tools

Flexibility, mobility and simplicity is demand of the businesses. Office 365 and Sharepoint are excellent tools in the area of […]

What is SSL and why do I need it?

An SSL certificate is basically a piece of software(read codes) that you install on a server that allows you to […]

Logix Infosecurity Achieves ISO 9001:2015 Certification

Serving with the best in class quality products & services since 1999, Logix is proud to announce its successful ISO 9001:2015 […]

[Infograph] 2017 Ransomware Attacks!

Email security in 2018

2017 had a long list of email attacks, spear phishing, whaling, phishing, scams, email impersonation etc, clearly a wide range […]

HC7 Gotya Ransomware

Another Ransomware, another day, another danger in the cyber space! To bring the discussion into perspective- A company is hit […]

Cyber security predictions for 2018

2017 kept the information security officers on toes. Something or the other happened and cyber criminals per persistent with successful […]

Keep your information secured without hindering sharing operations

Information rights management gives you the power to control information within the company as well as extend the control after […]

One of the most effective security measure is Multifactor Authentication

 

Locky Ransomware- Why this malware just won’t perish? Ykcol and Asasin- 2 more variants

Within less than a month, 2 new version of Locky ransomware have been released. YKCOL, locky spelled backwards and ASASIN […]

Email security with Office 365!

Business communication is synonymous to e-mails. A lot of sensitive and crucial information gets transferred via the medium all the […]

Cyber-Security Awareness Month. Things you need to be aware of

Since 2003, October every year is recognized as the cyber security awareness month. It is a good measure to spread […]

ANUBI Ransomware, new danger ready to strike!

ANUBI is another malicious code making rounds, infecting machines. Not much is known about the attack tactics used by the […]

Zimbra Collaboration Two-factor Authentication: Be more Secure

Two-factor authentication, or 2FA as it is commonly abbreviated, is a technology that provides identification of users with the combination […]

Why Zimbra 8.8 ?

A well crafted collaboration platform can increase productivity of your company significantly. Team cannot collaborate if they cannot communicate efficiently […]

Advanced email security for e-mail hoax. Be safe!

Email are the lifeline of business communication and have been an important vehicle for cyber intrusion for cyber criminals.The sheer […]

CIO Strategies for selecting the best-in-class Collaboration Tool

Imagine working on a new software launch where the designers, engineers and marketing teams are spread across different countries and […]

How to avoid Equifax breach with regular Vulnerability Assessments ?

Ever higher than before, the frequency and scale of cyber breaches continue to startle everyone. In this case, cyber thieves, […]

[Infographic] 5 Stages of Ransomware

Advanced Ransomware Threats are well planned by cyber criminals in order to acquire highest gains. Cyber criminals takes in the most […]

Xafecopy Trojan widespread in Android mobile devices

A new mobile malware Xafecopy Trojan has been detected in India, Kaspersky said in a report. It steals money from […]

711 million e-mails snared in largest spam-bot

A Paris-based security researcher, going by the pseudonymous handle ‘Benkow’, discovered an open and accessible web server hosted in the […]

Red Alert ! Bring Locky Ransomware turbulence under control before it causes havoc !

Indian government issued a warning about Locky ransomware attack on September 2, 2017. According to the researchers, this ransomware is […]

Why SMBs are the best target for latest cyber attacks?

Small and medium scale businesses (SMBs) of all streaks are at higher risk to latest cyber attacks compared to large […]

How to be safe when cloud has become a new home of cyber criminals

Cloud computing is the technology which is slowly sweeping the way organizations interact with technology and store information. With organizations […]

Save billions by including cyber security within business strategy

Technology changes much faster than most business can keep up. The proliferation of mobile technology, the Internet of Things (IoT) […]

Economic Impact of cyber-attacks on SMBs in 2017

Cyber-criminals are now targeting Small and medium business enterprises to extort fees. Ransomware, a kind of malware that, usually, limits […]

CIO strategies for preventing new security breaches

Digital transformation has ensured that cybersecurity is the biggest concern facing CIOs. As we proceed further in the 4th industrial […]

Strategic risks of a cyber-attack in 2017!

Open and digitally inter-connected technology platforms are shaping future of businesses. As the migration to digital platforms happen, hackers get […]

Diablo6 – a variant of Locky Ransomware

Many ransomwares continue to spread because email is ubiquitous and users are not cautious to maintaining cyber security. Such is […]

How to invest smartly using cyber security metrices!

In the hoax, usually companies end up spending blindly on the most crucial cyber security metrices, they need for their […]

Which is the most apt vaccine for 2017 epidemic: Cyber-Attacks?

With Internet, digitization, automation transformation taking center stage, cybersecurity turns up as one of the biggest concern. Email remains the […]

In 2017, to save yourself from hackers make DLP and cyber security walk hand in hand

Every business today is on networked computer systems in order to achieve higher work efficiency with smooth collaboration, storage and […]

[Infographic] Ransomware Victims Paid more than $25 Million in the last couple of years

   

Use your own Data wisely to detect an attack!

Perennial, for a problem to exist that cyber-criminals areahead of security measures deployed. Your own data can be used effectively […]

Cyber threats may wreak Havoc by 2020

India will face increasingly sophisticated “destructive” cyber threats as compared to the current scenario which is adding up to 200 […]

India 8th targeted country for web application attacks!

India is one of the top target countries for DDoS attacks. With 11.1 million attacks, India ranked 4th while US […]

Securing your email and network requires a paradigm shift in Mindset

Nearly every day a successful digital breach is reported. Major organizations, government bodies, hospitals, companies, public offices have been victims […]

Increase Threat Hunting beyond ATP Tools

ATP tools are the core of most of the cyber-crime fighting software’s. Today, we have a generation of products from […]

Do you know, if there is an intruder in your network!

You need to believe that you are being compromised before you start helping your organization stay secure. Intruders can very […]

Current Cyber-heist- Not just personal or corporate!

Yes, you read that right. Cyber criminals are not just after your personal or corporate data of the companies but […]

Website leaks data of 120 million Reliance Jio users, Telco claims data is safe?

This could be the biggest data breach in India. The data is supposedly leaked on a website called magicapk. The […]

5 ways to monitor DNS traffic for security threats

Monitoring DNS traffic can reveal a lot about Botnets on your network. Botnet-assisted Distributed denial of service (DDoS) attacks are […]

Cyber Security Lessons to learn from the latest RNC Data Leak

Important lessons are learned the hard way. Republican National Committee (RNC) hired Deep Root Analytics, a data analytics firm to […]

SMBv1- a very old protocol causing Wanna-Cry: should it be disabled?

SMBv1 isn’t safe and what-so-ever update you run or patch you update the problem is- you are still running SMB1. […]

Steps to stop targeted and advanced threats

Targeted attacks reap big rewards. Large organizations and institutions have faced a sophisticated attacks and millions of customer data has […]

Petya Ransomware is back to cause havoc

The world suffered another wreaking nightmare on Tuesday with the attack of a new NotPetya ransomware. Using the same malicious […]

How to protect your Cloud Files on Office 365

Cloud computing has been around for quite some time now and it has changed the way we work. The productivity […]

How to select best email archiving solution for your company?

A very important task is selecting an e-mail archiving product. Since archiving is a long-term proposition, so it’s crucial to […]

Why do companies need Sandboxing?

A sandbox gives you a chance to look into the future. It creates a security mechanism in which a separate, […]

Chinese Fireball Malware affects 250 Mn computers. India most affected.

Possibly the largest malware infection operation in the history is on its way with Fireball Malware. The Chinese malware is […]

UIWIX Ransomware. The threat of WannaCry is not over yet.

The evolved version of Wannacry ransomware; UIWIX Ransomware continues to shock the world. WannaCry Ransomware began spreading on May 12th […]

WannaCry Ransomware: How it affected India? What could be done to keep safe? What is next?

The Ransomware that shock the world started on 12th May as a massive cyber-attack no one has ever seen. By […]

The latest global cyberattack – Wannacry Ransomware.

On May 12th 2017, a ransomware of WannaCry or Wcry started spreading like wildfire starting from NHS system in UK. […]

Received a new job offer? Beware- Genuine or Fake?

Scammers are on the rise with more and more fictitious job offers appearing on job boards. More job seekers are […]

Which is the best choice for your organization- Shared or Dedicated web hosting?

Running a mid-sized business; choosing between a shared and dedicated web hosting can be a big challenge. Even when companies […]

Why do companies need responsive web design?

Responsive web design is an approach to creating web sites which can be viewed on any device; a mobile, a […]

Matrix Ransomware: Spreading to PCs through Malicious Shortcuts

The latest addition to the growing threat of ransomware is the Matrix Ransomware. Though the ransomware has been active for […]

What is Penetration Testing? And Why is it important for your organization?

Penetration testing or commonly known as pen testing is another important way of testing your company’s preparedness for a cyber-attack. […]

Dangers of Crypto-Ransomware and ways companies can avoid it!

Money makes ransomware the lucrative cyber theft option. Crypto-Ransomware is a type of ransomware that encrypts files on a user’s […]

Red-team Exercise: Explore your companies Vulnerabilities to Cyber-attack in 2017!

Red-team cyber security testing is optimally designed to measure how well your company’s defense and response capabilities will hold under […]

A classic ICICI Bank Email phishing in 2017

Are you using internet banking ? How secure are your financial transactions ? Do you scan your bank emails thoroughly ? How can you know […]

How are Locky and Cerber Ransomware Skilled at hiding themselves?

2 of the 3 major ransomware families responsible for 90% of ransomware attacks are Locky and Cerber Ransomware families. They […]

Staying ahead of the Cyber Security curve

IoT devices are set to revolutionize our lives. Companies are using IoT devices more than ever with automation and more […]

PetrWrap: Cybercriminals stealing code from one another

The latest version of Petya based ransomware is PetrWrap. Petya ransomware has been distributed as ransomware-as-a-service wherein the creator of […]

Finding the appropriate Content Management System(CMS) for your Organization

In today’s market, you can find a Content Management System(CMS) at arm’s length. How do you pick the right content […]

Kirk Ransomware: Star trek themed malware!

A new piece of ransomware has surfaced featuring star trek theme, named Kirk Ransomware, the first of its kind ransomware […]

Addressing the cyber security for your company

There are multiple facets of cyber threats and so are multiple things to do to secure the cyber domain of […]

How to select web development company in India?

Web has unprecedented increase in traffic. Businesses run from websites with the advent of e-commerce. Billions of dollars’ worth of […]

Selecting A Cloud Firewall System

Cloud, the ease of use which comes with it and of course cloud firewall system has become the most talked-about […]

Lawful Implementation of DLP Plan in India

Data loss prevention (DLP) systems are crucial tools for the safeguards of intellectual property and business secrets. IT is the […]

New target for hackers this year : Mac OS

A second example of Malware targeting Mac OS has surfaced in the past few weeks. Macro is a series of […]

The growing threat of GoldenEye Ransomware Attack

The latest version of Petya ransomware, GoldenEye, is attacking HR department with fake job applications loaded with the virus. It […]

Ransomware Spora: Everything you should know about it

Spora is the latest ransomware trojan which is highly sophisticated in its attacks and well crafted. Security experts already believe […]

The Home Ministry’s website hacked on 2017 February 12

On 12th February, 2017 the home ministry’s website got hacked. Attacks on our digital borders have been increasing for some […]

Cyber-crime marks a start of 2017 with Indian Banks Infiltration

Indian banks are more vulnerable to cyber-crime, infiltration and data leaks with the start of 2017. Note-ban has pushed up […]

4 Reasons why data backup is vital for your organization?

Irrespective of the size of your organization, data is an important part of your business.  Loss of data can directly […]

5 reasons why organization needs Data Loss Prevention or DLP Solution?

Your organization will have at least some sensitive data to protect from thieves and hackers. In this technology world, such […]

Increased popularity of Microsoft Office 365 in consumer & Enterprise in 2017

We generally think Microsoft dominated the enterprise apps segment only.But we forget that even our personal life revolves around Microsoft […]

Is a free email solution right for your company?

When you are a startup or starting a new business, cash becomes the real challenge that point of time. Any […]

5 Common Security mistakes that is putting your privacy at risks in 2019

How secure is your data? Ask yourself this question before it is too late to make amends. In order to […]

How can a company choose a good data loss prevention system solution

Companies look for data loss prevention system solutions to prevent costly data security breaches. There are several things to be […]

5 Factors to consider while choosing business email hosting service provider

Choosing an email hosting service provider is vital to the business. Thus it is important to think and decide on […]

Cloud Email Vs On-premise : Statistics and growth

The cloud email market is still in the early stages of adoption with 13 percent of identified publicly listed companies […]

Alert!! Alert!! Alert!! : This is one of the most scary Gmail Phishing Attack 2017

If you are a Gmail user and keeping every Personal documents and Bank Details in your gmail account then you […]

How challenging it is for companies like Google, Apple to fight battle against Cyber Security Threats?

Ransomware, DDoS Attacks, IoT Based machine to machine attacks and all upcoming attacks are changing the language of Cybersecurity Threats.Every […]

5 new names in cybersecurity investigations you may not have heard about

There are few names which has come while doing cybersecurity investigations in 2016. We thought you may not heard about […]

India Pakistan Cyber War in full throttle with new Ransomware attacks this new year 2017

When the whole world is busy with New year Celebration National Security Guard website got hacked, defaced with an abusive […]

Will Healthcare and Education Industry remain target for Cyber criminals in 2017?

Healthcare and Education records represent an extremely attractive target for cyber criminals in 2016. Will that continue in 2017? Healthcare […]

Microsoft Launched “Microsoft Teams” Collaboration Workspace – What’s new?

On November 2016, Microsoft launched Microsoft Teams. This chat-based team tool is made to be a one-stop look hub for […]

Transactional Emails vs Marketing Emails

Transaction Emails Transaction emails are the emails which are in most cases auto-generated emails from the server in response to […]

5 Email Phishing and Email Spoofing Prevention Tips

Email Spoofing and Email phishing attacks are more rampant than ever. Phishing Emails flow right into your Mailbox all around […]

3 Key Enterprise Messaging and Collaboration Trends to watch out in 2017

As digitalisation continues to unfold, interaction with partners and customers is changing into progressively vital for businesses. According to Gartner Top […]

6 Website Security Best Practices you must follow in 2017

In today’s world, every day we witness a new attack on website done by professional hackers. While hearing such news, […]

7 Critical Facts tells how IoT can cause cyber security threats in 2017

According to marketsandmarkets The Internet of Things market size is estimated to grow from USD 157.05 Billion in 2016 to […]

2017 Cyber Security Market, Trends and Predictions India and Global

Alarming Cybercrime is making it difficult for analyst and Research firms to accurately forecast cybersecurity spending. Yet we are covering […]

Thinking About DdoS Attack Protection? 4 Reasons Why It’s Time To Stop!

DDoS(Denial of Distributed Service) attack is a type of cyber attack that involves a large number of computers and huge […]

What to expect new in cyber security trends in 2017

In 2016 Spoofing, ransomware, phishing, and IoT-based DDoS attacks hit business and consumers. What to expect now in cyber security trends […]

Logix Infosecurity : Microsoft office 365 partner in Coimbatore

If you are looking for Microsoft office 365 partner in Coimbatore, your search ends here with us at Logix Infosecurity […]

Logix Infosecurity : Microsoft office 365 partner in Ahmedabad

If you are looking for Microsoft office 365 partner in Ahmedabad, your search ends here with us at Logix Infosecurity […]

Logix Infosecurity : Microsoft office 365 partner in Kolkata

If you are looking for Microsoft office 365 partner in Kolkata, your search ends here with us at Logix Infosecurity […]

[Infographic] Ransomware Attacks 2016 : Warning Act before you are the next Victim

Ransomware attacks continued to increase rapidly across 2016.According to Beazley Report, trend was particularly pronounced in the financial services, retail […]

8 Security Questions you should ask your Web Hosting Providers

When you face security challenges with your Web hosting it can be a genuine nightmare, particularly when you don’t realize […]

5 Preventive Tips to fight against Malvertising

Cyber criminals are becoming quite innovative these days. They are dedicatedly inventive themselves to come up with new techniques to […]

Why messaging and collaboration tools are most valuable enterprise apps?

According to Adobe 2016 Mobile Apps Report Messaging and collaboration applications are the most mission-critical mobile apps in enterprise today. Irrespective of […]

BFSI again scores high for email security threats and cybercrimes in 2016

BFSI Sector has always been favorite of all hackers and attackers. BFSI has always been top priority for email security threats […]

How to identify Phishing Email and Phishing Website?

Email Phishing attacks rose in the Christmas 2015 season, and have continued to climb in entire 2016. But  if we […]

Email Security Tips : Should you unsubscribe from spam emails?

Do you receive spam emails regularly in your inbox ? If so, you are not only one. What should you do […]

Microsoft Office 365 Vs Google apps marketshare and trends

Microsoft Office 365 Vs Google apps who is winning the email battle? Here in this blog we are trying to […]

20 Life-saving Tips and Email Security Best Practices 2017

We are almost at end of 2016. 2016 is an year of Cyber Criminals and Hackers.Checkout the statistics to know about […]

How to validate the most apt email hosting provider for your organization?

In today’s techno- world , no one can deny that email has become a primary source of business communication be […]

Major DDoS Attacks : Twitter to Clinton-Trump sites are victim.

2016 is again a prolific time for Distributed Denial of Service or DDoS attacks. Starting from Twitter to Clinton- Trump election […]

Logix Infosecurity : Microsoft office 365 partner in Pune

If you are looking for Microsoft office 365 partner in Pune, your search ends here with us at Logix Infosecurity […]

Logix Infosecurity : Microsoft office 365 partner in Delhi

If you are looking for Microsoft office 365 partner in Delhi, your search ends here with us at Logix Infosecurity […]

Logix Infosecurity : Microsoft office 365 partner in Chennai

If you are looking for Microsoft office 365 partner in Chennai, your search ends here with us at Logix Infosecurity […]

Top 5 communications IT trends in 2016

Came across an article today morning – Top 5 communications IT trends in 2016 published on January 21st 2016 by author […]

Hybrid Cloud Email : Choosing the best of breed

This is an era of  Hybrid everywhere – Choosing the best of breed. Hybrid Cloud, Hybrid Apps and now Hybrid […]

Why BFSI Industries prefer hybrid mail providers for Business Email?

Business email requirement for BFSI industry works differently altogether. Employees of BFSI Industries need  messaging platforms with: Multiple device access Online storage […]

Email Phishing Vs Email Spoofing Vs Email Hacking

Email Phishing Vs Email Spoofing Vs Email Hacking : Are you confused with all these terms? Earlier in May 2016, […]

Email Backup Vs Email Archiving : Which one to select?

Email Backup Vs. Email Archiving is the common confusion that holds true for many organizations due to Industry standards Regulatory […]

Choosing Office 365? Think – How to handle Office 365 email archiving

If you are choosing Office 365? Re-Think – How you will handle Office 365 email archiving Organizations today have started […]

Email Phishing Vs Spoofed Email Vs Email Hacking

We often get confused with Email Phishing Vs Spoofed Email Vs Email Hacking. Earlier in May 2016, a news came that […]

Redefining backup strategies for ransomware attacks

Redefining backup strategies for ransomware attacks is the first step to protect yourself or your organization from ‘ransomware’. Ransomware has also become crucial security […]

How does Advanced Threat Protection provide malware, ransomware free clean mails?

Advanced threat protection provides advanced solution to handle smarter attacks. Let’s now look at how? News headlines over and over, even […]

Logix Infosecurity : Microsoft Office 365 partner in India

If you are looking for Microsoft Office 365 partner in India, your search ends here with us at Logix Infosecurity […]

Logix Infosecurity : Microsoft office 365 partner in Bangalore

If you are looking for Microsoft office 365 partner in Bangalore, your search ends here with us at Logix Infosecurity […]

Gain Office 365 Security through multi factor authentication

Security being a biggest concern in cloud, lets look at how can you gain Office 365 Security through multi factor […]

5 Reasons why you should consider Microsoft Office 365 over Hosted Exchange

Picking the right cloud answer for your business email can be hard, considering the diverse offers you need to take […]

Logix Infosecurity : Microsoft Office 365 reseller in Mumbai

Are you looking for Microsoft Office 365 reseller in Mumbai? Your search ends here with us at Logix Infosecurity Here are […]

Logix Infosecurity : Microsoft office 365 partner in Mumbai

If you are looking for Microsoft office 365 partner in Mumbai, your search ends here with us at Logix Infosecurity […]

Email phishing attacks: Know before you click phishing website

Email Phishing attacks rose in the Christmas 2015 season, and have continued to climb in the new year according to APWG […]

CryptoJoker Ransomware: 4 Life-saving tips to protect your files

Cryptojoker ransomware is another name to the ransomware list. 2016 is shaping up as the year of ransomware and victims […]

Email security statistics 2016 Know before you are next victim

 Is Email Security a concern for you? If not read the facts and email security statistics 2016 and rethink. Inspite […]

Bingo !! Logix Infosecurity is recognized as best Microsoft Cloud Service Provider in India

We are absolutely thrilled.We are recognized as the Best Microsoft Cloud Service Provider in India!! “A BIG Thank You” to all […]

Be-aware : 20+ Email spoofing cases in India in 2016 may shock you.

Email spoofing attacks in business is growing exponentially in India. There has been more than 20+ known email spoofing cases […]

Ransomware attacked 180 Indian companies : shocked by the news?

Read a news on Economic Times that Ransomware attacked 180 Indian Companies. Ransomware, globally caused companies a loss of a whopping […]

Hybrid Mail Solutions : combining Office 365 & Cloud Zimbra

Before we discuss Hybrid Mail Solutions, we might want to guide your regard for one basic query. If your organization […]

Zepto Ransomware : What you need to know to protect your files.

Are you aware of the latest Ransomware :  Zepto Ransomware or Zepto js? There are numerous malicious program all through […]

Continue to chat
Hello 👋
Let us know how we can help you!