Chinese hackers swindles Rs. 130 crore from an Indian arm of an Italian company

Chinese group steals 18.3 million dollar in a cyber heist

Share this:    A Chinese hackers team stole 18.3 million dollars (Rs. 130 Crore) from the Indian arm of Italian company Tecnimont SpA by taking local managers into confidence that the money was required for an acquisition, one of the biggest cyber heists in the country,  the Economic Times reported. The hackers sent emails to the head of Tecnimont Pvt […]

Continue reading


Widespread Apple ID Phishing Attack Pretends to be App Store Receipts

apple0

Share this:    This is big, the Apple-ID which managed to stay away from compromises is under attack. A notorious phishing campaign is underway that pretends to be a purchase confirmation from the Apple App store. This has come to light recently and seems to be a classic phishing campaign and interestingly it has gone widespread quickly […]

Continue reading


Are the e-commerce sites cyber-safe?

ecommerce1

Share this:    Can there be someone else in your shopping cart? Well, the scenario does sound scary but it might very well be true. Hackers constantly come up with crafty ways to get into user accounts to siphon details and use them in various illegal activities. The payment card details are of particular interest to hackers […]

Continue reading


Economic Impact of DMARC for companies across the globe

Economic Impact of DMARC for companies

Share this:    What is DMARC? DMARC is a security standard which allows a domain to declare a policy of how it wants email processors to examine and treat emails claiming to be from that declaring domain. The core policies are “none” (do nothing special, and optionally report), or “quarantine” or “reject” messages which fail various other […]

Continue reading


Concerns of SMBs on DMARC

protect your domain reputation

Share this:    DMARC (domain-based message authentication, reporting and conformance) has been gaining traction over the past couple of years. Organisation familiarising themselves with what DMARC is and its benefits is increasing. Companies are implementing it on multiple occasions after learning about it. However, not every organisation is keen on using DMARC. There are still concerns over […]

Continue reading


Latest DNS Spoofing attacks use fragmented datagrams. Can you avoid it?

dns spoofing using fragmented datagrams

Share this:    With a little attention, as it turns out, one can spoof fake DNS responses using fragmented datagrams. How is it done? To match authentic DNS responses to their corresponding queries, resolvers and operating system check: Name of the query Type of the query Source/destination address Destination port (16 bits) DNS transaction ID (16 bits) […]

Continue reading


Prevent the Fileless Attacks for your Windows PC

fileless attack

Share this:    What is a Fileless or non-malware attack A non-malware attack is one in which an attacker uses existing software, allowed applications and authorized protocols to carry out malicious activities. Non-malware attacks are capable of gaining control of computers without downloading any malicious files, hence the name. Non-malware attacks are also referred to as fileless, […]

Continue reading