Your Guide To Prevent Phishing – Know How Hackers Think

Your Guide To Prevent Phishing - Know How Hackers Think

( 4 min read ) Cyber criminals are getting creative with their ways and organizations have to lookout for new ways to prevent phishing attacks. You do need to stay abreast of cyber news, so you can spot newer ways hackers are targeting businesses. But if there was a way you could understand the primary methods hackers use to plan […]

Continue reading


Pune-based Engineering Company Duped Out Of 50 lakhs

Pune-based engineering company duped

( 2 min read ) It’s cyber fraud cases like these that remind us of the gravity of cyber security. A Pune-based engineering company, with an MNC status no less, fell prey to a ‘man-in-the-middle’ attack. As a result, it lost around 56,000 euros or approximately 50 lakh INR to the cyber-attack. Case Specifics The hackers supposedly gained illegal access […]

Continue reading


Looking to migrate Zimbra to Office 365? There’s a better alternative to upgrade: Zimbra + Office 365 Hybrid

Zimbra to Office 365 Migration Alternative

( 3 min read ) Zimbra is one of the leading email collaboration solutions in the market. It is a robust, flexible and affordable mailing solution. It comes with all the features you need for messaging and collaboration. However, as per the organization’s requirement, business owners plan to migrate Zimbra to Office 365. One reason is scalability. Zimbra, while powerful, […]

Continue reading


Prevent Social Engineering Attacks

Prevent Social Engineering Attacks

( 2 min read ) This is the final part in our on-going series on social engineering. In this blog, we give you methods to prevent social engineering attacks. According to skilled social engineers, our physical stance ‘leaks’ emotional content, which can indicate deceit and malintent. With voice phishing, you can at least make out gaps and voice modulation that […]

Continue reading


5 Social Engineering Attacks You Should Know

5 Social Engineering Attacks

( 3 min read ) This is Part Two of our 3-part series on Social Engineering. In this blog, we discuss 5 social engineering attacks you should be aware of. From our previous blog, we know objectively that SE is the act of tricking a person into doing something against their will. The context behind SE activities can be good or bad. […]

Continue reading


What Is Social Engineering?

What is Social Engineering?

( 3 min read ) When it comes to cyber-attacks, our thoughts jump immediately to malicious code and the misuse of technology. However, the success of a cyber-attack relies on other, not-so-famous tricks along with effective security breaching methods. The subtler, more invisible aspect of a cyber-attack is social engineering. We say ‘tricks’ and not ‘techniques’ because that’s exactly what […]

Continue reading


Your Office 365 Credentials Are Vulnerable To This MS Teams Phishing Attack

MS Teams Phishing Attack Steals Office 365 Credentials

( 2 min read ) It is time you should probably review the safety of your Office 365 credentials. Recently, Microsoft Teams was targeted for a phishing attack. As many as 50,000 Office 365 users are vulnerable. As we see a rise in work from home culture, the use of Microsoft Teams for remote working collaboration has increased. Read further […]

Continue reading


This Pharma Lab Data Breach Caused Multiple Plants to Shut Down

Pharma Lab Data Breach Causes Plant Shutdown

( 2 min read ) A successful data breach at Dr Reddy’s, a well-known pharmaceutical company, caused a total shutdown of multiple laboratories and plants. This data breach at Dr Reddy’s took place soon after a trial approval of the Russian Covid-19 vaccine. In our previous blog on the top companies targeted for email spoofing, we discussed how the current […]

Continue reading


These two companies are favourites for spoofed emails

Spoofed Email Targets

( 2 min read ) A quarterly report for cyber statistics has stated that two companies in particular have become go-to targets for spoofed emails. Due to the continued over-reliance on digital communication, it is our guess that the top companies being chosen for impersonation are the ones that are closely linked with our day-to-day activities. The top companies getting […]

Continue reading