Blocking Bots – The Role of an Advanced WAF

Blocking Bots with Advanced WAF

( 4 min read ) These days, we don’t go online. We are online. All the time. Especially with a majority of the population working from home and being “always-on”. Traffic to websites has grown exponentially. Be it work, entertainment, information, or reading articles lazily because you are bored… Add to that the fact that most of our activities like […]

Continue reading


5 Business Benefits of Cloud-to-Cloud Backup

Business Benefits of Cloud-To-Cloud Backup

( 2 min read ) Barracuda recently undertook a global IT survey to address the changing needs of remote collaboration, cloud computing, cloud data security, backups, and recovery. From the survey, it was made clear that the traditional methods of data backups and recovery were unsuitable for the current times. To handle the transition to the cloud, Barracuda introduced their […]

Continue reading


The State of Office365 Backup – Barracuda’s Cloud to Cloud Backup

Cloud To Cloud Backup

( 2 min read ) Research in recent cybersecurity and IT trends has demonstrates that the shift to remote work and offsite collaboration has intensified the challenges of data protection and backups. With more and more data and applications being served from the cloud, Barracuda commissioned a survey with global IT decision makers (titled, ‘The State of Office365 backup’) about […]

Continue reading


Microsoft Email Users Fall Prey to FedEx Phishing Emails

FedEx Phishing Emails

( 3 min read ) Microsoft email users seem to be repeatedly be targeted by one phishing scam after another. One curious observation is that when Microsoft email users are targeted, the attacks are geared more towards the theft of credentials than performing malicious activities on the victim’s system. In a previous case involving SolarWinds, a similar password theft attempted […]

Continue reading


Celsius Data Breach – Phishing Claims More Victims

Celsius Data Breach

( 3 min read ) Celsius, a crypto lending service, recently learned of a security break at one of their third-party service providers, leading to a data breach at their own company. All of its customers faced serious complications as they had their entire personal data exposed. Hackers infiltrated through Celsius’s third-party email distribution system, and thus were able to […]

Continue reading


Server Hack Costs 1.5 Crore in Losses

Server Hack Costs 1.5 Crore

( 3 min read ) Case Specifics A private company based in Pune recently suffered from a server hack. The hackers, who remain as of yet unidentified, were able to get to sensitive financial credentials. Using these, the hackers were able to authorize the transfer of a jaw-dropping 1.5 crore rupees to their own bank accounts. The company officials didn’t […]

Continue reading


Major Data Breach of Government Computers

Major Data Breach

( 2 min read ) The National Informatics Center (NIC) and the Ministy of Electronics & Information Technology (MeitY) suffered a data breach in early September. The NIC is a governmental body responsible for quality information and communications technology (ICT). MeitY, in turn, promotes e-Governance for modern citizens, working towards continuous growth of the Electronics, IT & ITeS industries. A malware […]

Continue reading


Young Techie Creates An Android App That Can Spoof Emails

Email Spoofer app

( 2 min read ) Dangers of the Email Spoofer App App-savvy people beware. A new app is on the market that can launch a spoofing attack on you. 22-year-old Rupesh Bhandari was recently arrested for developing and deploying a Google Play Store App called Email Spoofer that can forge sender signatures on fake emails and steal money. The news […]

Continue reading


Popular Scams Perpetrated Through Security Breach

Popular Scams Perpetrated Through Security Breach

( 4 min read ) The Biggest ‘Cyber Heists’ of the Century Although we wish for the internet to be a safe place for our transactions and data handling, the bitter truth is that it’s not. While from one end, security providers are doing heavy RnD and advancements towards making the WWW bulletproof, there are hackers intensifying their counterefforts to […]

Continue reading