Microsoft Report on Cleverest Phishing Tactics

Microsoft Report on the cleverest phishing tactics of 2019

Microsoft Reports on the Cleverest Phishing Tactics of 2019 While for individuals it is frustrating — and threatening — how quickly cyber-criminals are evolving, for cybersecurity providers it is a matter of amused contemplation. Studying cases upon cases of successful cyber-attacks helps security providers reverse engineer tactics of the hackers to provide countermeasures preemptively. In […]

Continue reading


Ukraine Targeted by a Russian APT Hacker Team

Russian APT Hacker Team Strikes Out

Russian APT Hacker Team Strikes Out The Military and the Government are under the gun once again. The country of Ukraine was very recently targeted by a Russian APT Hacker team. The intended targets of this attack weren’t just high-ranking decision makers, but also lower level officials working under the Government in fields like Journalism, […]

Continue reading


Defence Ministry Targeted For Phishing

Warning Issued To Defence Personnel

Warning Issued for Defence Personnel The defence ministry has issued an emergency warning to all defence personnel not to open a malicious email making the rounds of the defence services. It all started after the Armed Forces were targeted for a cyber-attack on Friday 6th December. The attempt alerted the cyber wing of our tri-services […]

Continue reading


Most Likely Phishing Targets

Targets of Phishing Attacks

Organizations Most at Risk of Phishing Phishing is a rapidly damaging cybercrime that has targeted a wide variety of domains and organizations. It has evolved past email into Vishing and Smishing. The question logically arises: who are the intended targets of these attacks? Why do the cybercriminals feel the need to come up with newer […]

Continue reading


Protection Against Online Scams

Protection AGainst Online Scams

Guidelines to protect yourself against cyber-scamming Digitisation has seeped into virtually all aspects of our interactions, from virtual copies of our identities to cashless forms of money. Every day, millions of digital transactions are made, some containing meagre amounts for small-scale purchases, others containing transfers of significant amounts between banks or individuals. Data from the […]

Continue reading


Fake voicemail notifications targetting credentials

Phishing using fake voicemails

Fake voicemail notifications aid scammers to collect Office 365 login credentials Heard of phishing attacks? There’s been an update! They are no longer your usual garden-variety email-based attacks. As the average customer becomes increasingly suspicious of unauthorized emails in their inboxes, malicious attackers get more creative and expand their arsenal of weapons. The latest strategy […]

Continue reading


Phishing goes beyond email

Phishing beyond email

While phishing expands its horizons, should your security? Expanding its customer base is one of the key strategies that a leading company uses to retain its position in the ever-competitive market. This is true for every industry and applicable to every business that wants to maximize its profits. It should not astonish you  to let […]

Continue reading


The Dangers of Identity Theft

Dangers of Identity Theft

Identity Theft – what and how to stay safe? With cloud storages and online platforms growing stronger by the day, it wouldn’t be an exaggeration to say that we have digital equivalents of our identities up on the internet these days. SD Card filling up with photos? Save to Cloud! File Access necessary from all […]

Continue reading


Third Party VPN services under threat of attack by the infamous APT5 Team

VPN services found vulnerable

VPN Compromised — Are you Safe? State sponsored hacking has been around for ages. It occurs when a nation’s government backs a cyber attack against another country or one of its departments. One such hacker team very active these days is the Chinese state-sponsored team called APT5. Their latest target? Virtual Private Networks. To be […]

Continue reading