Latest DNS Spoofing attacks use fragmented datagrams. Can you avoid it?

dns spoofing using fragmented datagrams

Share this:    With a little attention, as it turns out, one can spoof fake DNS responses using fragmented datagrams. How is it done? To match authentic DNS responses to their corresponding queries, resolvers and operating system check: Name of the query Type of the query Source/destination address Destination port (16 bits) DNS transaction ID (16 bits) […]

Continue reading


Prevent the Fileless Attacks for your Windows PC

fileless attack

Share this:    What is a Fileless or non-malware attack A non-malware attack is one in which an attacker uses existing software, allowed applications and authorized protocols to carry out malicious activities. Non-malware attacks are capable of gaining control of computers without downloading any malicious files, hence the name. Non-malware attacks are also referred to as fileless, […]

Continue reading


India witnessed over 4.36 lakh cyberattacks in the first half of 2018

India witnessed over 4.36 lakh cyberattacks in the first half of 2018

Share this:    India ranks 21st in the global tally with 6,95,396 attacks hackers across various countries. However, India took the 13th spot in terms of hackers initiating attacks with 73,482 such incidents. Globally, the UK was the biggest source country with a total of 97,680,746 attacks this year, while the US was the top destination country […]

Continue reading


Ransomware Action Plan for Indian Businesses

Indian businesses

Share this:    Sometime in May last year the world woke up to the menace Ransomware can cause. Corporations were caught unaware of something as dangerous as ransomware could strike them and rake up millions of dollars in damages at multiple levels. There is no question vulnerabilities remain given the penetration of different technologies in our lives […]

Continue reading


Penetration Test vs Vulnerability Assessment. Choose wisely, stay protected.

penetration testing vulnerability assessment

Share this:    It is definitely surprising that most people take penetration testing for vulnerability testing and vice-versa, sometimes even forego one for the other. Penetration testing exploits vulnerabilities in your system architecture, while vulnerability assessment checks for known vulnerabilities and generates a report on risk exposure. Both penetration testing and vulnerability assessment depend mostly on three […]

Continue reading


2 million network storage devices affected by unpatched zero-day vulnerabilities!

2 million network storage devices

Share this:    Network storage devices (NAS), are critical for small and medium businesses as it adds to the extra storage space when these business are running out of space. Critical shortcomings have been discovered in the NAS devices such as WD my book, SeaGate home, Medion Lifecloud, Netgear Stora. This critical vulnerability allows actors to exploit […]

Continue reading


Facebook’s massive Data breach: what you need to know

facebook data breach

Share this:    The worries for facebook do not seem to stop with cambridge analytica and this time around it’s a massive data breach of almost 50 million user accounts and another 40 million which are at risk, the vulnerability allowed hackers to take direct access to all these accounts information. As per Facebook, the bugs that […]

Continue reading