Office365 Phishing Scam

Office365 Phishing Scam

( 3 min read ) When your go-to productivity applications start getting caught up in phishing scams, it makes you take a step back and wonder whether any vendor’s application is truly safe without a third-party security service. Microsoft has been facing a lot of heat from the hackers, be it the Hafnium group or the Dark Halo group. Another […]

Continue reading


Microsoft Email Users Fall Prey to FedEx Phishing Emails

FedEx Phishing Emails

( 3 min read ) Microsoft email users seem to be repeatedly be targeted by one phishing scam after another. One curious observation is that when Microsoft email users are targeted, the attacks are geared more towards the theft of credentials than performing malicious activities on the victim’s system. In a previous case involving SolarWinds, a similar password theft attempted […]

Continue reading


Celsius Data Breach – Phishing Claims More Victims

Celsius Data Breach

( 3 min read ) Celsius, a crypto lending service, recently learned of a security break at one of their third-party service providers, leading to a data breach at their own company. All of its customers faced serious complications as they had their entire personal data exposed. Hackers infiltrated through Celsius’s third-party email distribution system, and thus were able to […]

Continue reading


Banking Customers Fall Prey to Phishing Scams

Top 5 Indian Banks Face Phishing Scam

( 3 min read ) Sensitive banking information is always a matter of great anxiety for us and a matter of great opportunity for hackers. If, through phishing scams, hackers are able to outright steal your credentials, it saves them the trouble and trickery of getting you to direct payments through false ruses and theatrics. To that effect, warning bells […]

Continue reading


Exchange Email Hack

Exchange Email Hack

( 2 min read ) The Rampage Continues Vulnerabilities in a major player’s server architecture is an open invitation to hackers; once a group successfully exploits them, others line up behind them to try their luck. This is what’s currently happening with Microsoft. The Exchange email hack attempts continue to bother Microsoft users. Starting in early March 2021, the Exchange […]

Continue reading


Growing Concerns of Credential Theft Cases

Credential Theft Cases

( 3 min read ) Deep research into cyber security threat patterns has revealed some trends in hackers’ behaviour that are worth noting. Studies show that cyber criminals are moving away from malicious code to gain entry into their victim’s systems. More and more credential theft cases are coming to light, indicating that hacker’s will now bait victims through phishing […]

Continue reading


Haryana Hackers Steal INR 1 Crore

Haryana Hackers Steal INR 1.05 Crore

( 2 min read ) Haryana hackers defrauded ISGEC Heavy Engineering company and nicked an amount of INR 1.05 crore. These hackers intruded upon ISGEC’s communication with foreign suppliers in France and Germany. Anil Sunder, VP, material department of ISGEC, gave direction to the legal action that unraveled. The investigative authorities focused their attention on a London-based bank, which was […]

Continue reading


Microsoft Fails to Block O365 Email Spoofing Attacks

Microsoft Fails to Block O365 Email Spoofing Attacks

( 3 min read ) Microsoft is under the gun again for cyber fraud. 200 million+ users are at a risk of O365 email spoofing attacks. Security researchers have confirmed activity around the same. They have also identified some domain areas which will likely be the hot targets for these spoofing attacks. Office 365 users working in financial services, healthcare […]

Continue reading


Your Guide To Prevent Phishing – Know How Hackers Think

Your Guide To Prevent Phishing - Know How Hackers Think

( 4 min read ) Cyber criminals are getting creative with their ways and organizations have to lookout for new ways to prevent phishing attacks. You do need to stay abreast of cyber news, so you can spot newer ways hackers are targeting businesses. But if there was a way you could understand the primary methods hackers use to plan […]

Continue reading


Prevent Social Engineering Attacks

Prevent Social Engineering Attacks

( 2 min read ) This is the final part in our on-going series on social engineering. In this blog, we give you methods to prevent social engineering attacks. According to skilled social engineers, our physical stance ‘leaks’ emotional content, which can indicate deceit and malintent. With voice phishing, you can at least make out gaps and voice modulation that […]

Continue reading