Server Hack Costs 1.5 Crore in Losses

Server Hack Costs 1.5 Crore

( 3 min read ) Case Specifics A private company based in Pune recently suffered from a server hack. The hackers, who remain as of yet unidentified, were able to get to sensitive financial credentials. Using these, the hackers were able to authorize the transfer of a jaw-dropping 1.5 crore rupees to their own bank accounts. The company officials didn’t […]

Continue reading


Malwarebytes Hacked by The Same Group Behind SolarWinds Security Breach

Malwarebytes Hacked By The Same Group Behind Solarwinds Breach-27

( 3 min read ) Cyber security firm themselves are lucrative targets for hackers. It is a matter of pride for them; their way of gloating that they caused a security breach at a company that itself provides safety such breaches. US-based cyber security company, Malwarebytes was attacked by the same hackers who’d initially targeted SolarWinds, an IT software company. […]

Continue reading


Common Cyber Attacks You Should Know

Common Cyber Attacks You Should Know

( 4 min read ) It is true that most common cyber attacks leverage gaps in technical devices or technological aspects a business uses, to cause damage. It is, however, wrong to assume that hacking attempts befall only technological companies; any business big or small, or even individuals have become likely targets for cyber attacks. It is equally wrong to […]

Continue reading


Web Security Assessment Services by Logix

Website Security Assessment Services by Logix

( 2 min read ) Your website is your gateway to the online world. Its performance, freshness, and quality represent the authority of your brand. That’s why doing website security assessment from time to time is a vital part of your overall online security. There might be vulnerabilities trailing behind due to poor coding, missing updates, or open ports for […]

Continue reading


Prevent Social Engineering Attacks

Prevent Social Engineering Attacks

( 2 min read ) This is the final part in our on-going series on social engineering. In this blog, we give you methods to prevent social engineering attacks. According to skilled social engineers, our physical stance ‘leaks’ emotional content, which can indicate deceit and malintent. With voice phishing, you can at least make out gaps and voice modulation that […]

Continue reading


5 Social Engineering Attacks You Should Know

5 Social Engineering Attacks

( 3 min read ) This is Part Two of our 3-part series on Social Engineering. In this blog, we discuss 5 social engineering attacks you should be aware of. From our previous blog, we know objectively that SE is the act of tricking a person into doing something against their will. The context behind SE activities can be good or bad. […]

Continue reading


What Is Social Engineering?

What is Social Engineering?

( 3 min read ) When it comes to cyber-attacks, our thoughts jump immediately to malicious code and the misuse of technology. However, the success of a cyber-attack relies on other, not-so-famous tricks along with effective security breaching methods. The subtler, more invisible aspect of a cyber-attack is social engineering. We say ‘tricks’ and not ‘techniques’ because that’s exactly what […]

Continue reading


Look out for Covid-19 Related Cyber Scams

Covid Related Cyber Scams

( 3 min read ) While regulations have lifted the restrictions of strict lockdowns, common sense and the growing number of Covid-19 cases suggest otherwise. A lot of people are still stepping out of the house only when it’s absolutely unavoidable. Several industry sectors are continuing to operate from home. Individuals are depending on online shopping to fulfil their basic […]

Continue reading