Accenture in The Crosshairs of Lockbit Ransomware Attack

Lockbit Ransomware Attack

( 3 min read ) A well-known consulting firm, Accenture, has fallen prey to a ransomware attack by the infamous Lockbit group. The Lockbit ransomware attack, infamously called Lockbit 2.0, has resulted in a data leak of Accenture’s encrypted data, which is currently under the duress of the hacker gang. Lockbit is blackmailing Accenture that it will publish the data […]

Continue reading


Cisco Secure Email Cloud Mailbox – Simplified Email Security for Small Businesses

Cisco Secure Email Cloud Mailbox For Simplified Email Security

( 2 min read ) When it comes to email security, small businesses especially have to follow the ‘Do It Right the First Time’ mantra. Enterprises of this scale need to concentrate on growing their businesses, boosting their productivity, and adapting to remote collaboration. Not only can they not afford to fall prey to an email attack, they also can’t […]

Continue reading


Cisco Reports On Rising Crypto Mining Activites

Rising Crypto Mining Activites

( 2 min read ) Microsoft Exchange servers have been targeted time and again for crypto mining ever since Bitcoin and cryptocurrency gained footing in the digital transaction world. The good news for our Logix Cisco Email ATP customers is that they’re protected against Lemon Duck Crypto Mining Malware. Why is crypto mining dangerous? The term crypto mining means gaining […]

Continue reading


Email Archives VS Email Backups

Email Archives VS Email Backups

( 4 min read ) Hassles of email management The volume of email data a business generates is humongous. This can cause problems of storage optimization and also legal compliance if you are planning to become or already are a certified business (ISO and other industry standards). For audits, you need to furbish email trails and past emails. In order […]

Continue reading


Achieve a lower Google Workspace Ownership Cost with Google Workspace Coexistence

Lower Google Workspace Ownership Cost

( 2 min read ) A unique Google Workspace + Cloud Zimbra coexistence model An organisation’s IT budgeting is usually decided in early financial year stages. Throughout the year, organisations abide by this amount (naturally considering slight deviations). Now, when vendors introduce a sudden change in their plans and structure, it puts IT departments in a jam. Something similar has […]

Continue reading


Government Domains Breached – Official Government Data At Risk

Government Domains Breached

( 3 min read ) Government officials are under threat of a phishing campaign as ids of official government domains such as @nic.in and @gov.in fell into the wrong hands. However, these government domains were not breached directly; the hackers got to the IDs of these domains through separate data breaches at Air India, Big Basket, and Dominos. These data […]

Continue reading


India Faces 213 Weekly Ransomware Attacks

India Faces 213 Weekly Ransomware Attacks

( 2 min read ) Following the 2020 email hacking riot, 2021 did not let us off easy. More and more emails are being targeted even this year, just that the traditional forms of phishing are replaced by ransomware attacks. Statistics show that India continues to face the heat of email infiltration, and has recorded 213 weekly ransomware attacks since […]

Continue reading


Remote Access Trojan – Your Passwords at Risk

Remote Access Trojan (RAT)

( 3 min read ) A new variant of an old trojan has now been activated, putting passwords and Windows PCs at risk. The Remote Access Trojan (RAT) is not new. It’s been around for quite a while. However, a new phishing campaign is currently delivering a customized variant of the remote access trojan, which aims to steal passwords and […]

Continue reading


Office365 Phishing Scam

Office365 Phishing Scam

( 3 min read ) When your go-to productivity applications start getting caught up in phishing scams, it makes you take a step back and wonder whether any vendor’s application is truly safe without a third-party security service. Microsoft has been facing a lot of heat from the hackers, be it the Hafnium group or the Dark Halo group. Another […]

Continue reading