Malwarebytes Hacked by The Same Group Behind SolarWinds Security Breach

Malwarebytes Hacked By The Same Group Behind Solarwinds Breach-27

( 3 min read ) Cyber security firm themselves are lucrative targets for hackers. It is a matter of pride for them; their way of gloating that they caused a security breach at a company that itself provides safety such breaches. US-based cyber security company, Malwarebytes was attacked by the same hackers who’d initially targeted SolarWinds, an IT software company. […]

Continue reading


Common Cyber Attacks You Should Know

Common Cyber Attacks You Should Know

( 4 min read ) It is true that most common cyber attacks leverage gaps in technical devices or technological aspects a business uses, to cause damage. It is, however, wrong to assume that hacking attempts befall only technological companies; any business big or small, or even individuals have become likely targets for cyber attacks. It is equally wrong to […]

Continue reading


Haryana Hackers Steal INR 1 Crore

Haryana Hackers Steal INR 1.05 Crore

( 2 min read ) Haryana hackers defrauded ISGEC Heavy Engineering company and nicked an amount of INR 1.05 crore. These hackers intruded upon ISGEC’s communication with foreign suppliers in France and Germany. Anil Sunder, VP, material department of ISGEC, gave direction to the legal action that unraveled. The investigative authorities focused their attention on a London-based bank, which was […]

Continue reading


Microsoft Fails to Block O365 Email Spoofing Attacks

Microsoft Fails to Block O365 Email Spoofing Attacks

( 3 min read ) Microsoft is under the gun again for cyber fraud. 200 million+ users are at a risk of O365 email spoofing attacks. Security researchers have confirmed activity around the same. They have also identified some domain areas which will likely be the hot targets for these spoofing attacks. Office 365 users working in financial services, healthcare […]

Continue reading


Your Guide To Prevent Phishing – Know How Hackers Think

Your Guide To Prevent Phishing - Know How Hackers Think

( 4 min read ) Cyber criminals are getting creative with their ways and organizations have to lookout for new ways to prevent phishing attacks. You do need to stay abreast of cyber news, so you can spot newer ways hackers are targeting businesses. But if there was a way you could understand the primary methods hackers use to plan […]

Continue reading


Prevent Social Engineering Attacks

Prevent Social Engineering Attacks

( 2 min read ) This is the final part in our on-going series on social engineering. In this blog, we give you methods to prevent social engineering attacks. According to skilled social engineers, our physical stance ‘leaks’ emotional content, which can indicate deceit and malintent. With voice phishing, you can at least make out gaps and voice modulation that […]

Continue reading


5 Social Engineering Attacks You Should Know

5 Social Engineering Attacks

( 3 min read ) This is Part Two of our 3-part series on Social Engineering. In this blog, we discuss 5 social engineering attacks you should be aware of. From our previous blog, we know objectively that SE is the act of tricking a person into doing something against their will. The context behind SE activities can be good or bad. […]

Continue reading


What Is Social Engineering?

What is Social Engineering?

( 3 min read ) When it comes to cyber-attacks, our thoughts jump immediately to malicious code and the misuse of technology. However, the success of a cyber-attack relies on other, not-so-famous tricks along with effective security breaching methods. The subtler, more invisible aspect of a cyber-attack is social engineering. We say ‘tricks’ and not ‘techniques’ because that’s exactly what […]

Continue reading


Your Office 365 Credentials Are Vulnerable To This MS Teams Phishing Attack

MS Teams Phishing Attack Steals Office 365 Credentials

( 2 min read ) It is time you should probably review the safety of your Office 365 credentials. Recently, Microsoft Teams was targeted for a phishing attack. As many as 50,000 Office 365 users are vulnerable. As we see a rise in work from home culture, the use of Microsoft Teams for remote working collaboration has increased. Read further […]

Continue reading


This Pharma Lab Data Breach Caused Multiple Plants to Shut Down

Pharma Lab Data Breach Causes Plant Shutdown

( 2 min read ) A successful data breach at Dr Reddy’s, a well-known pharmaceutical company, caused a total shutdown of multiple laboratories and plants. This data breach at Dr Reddy’s took place soon after a trial approval of the Russian Covid-19 vaccine. In our previous blog on the top companies targeted for email spoofing, we discussed how the current […]

Continue reading