Office365 Phishing Scam

Office365 Phishing Scam

( 3 min read ) When your go-to productivity applications start getting caught up in phishing scams, it makes you take a step back and wonder whether any vendor’s application is truly safe without a third-party security service. Microsoft has been facing a lot of heat from the hackers, be it the Hafnium group or the Dark Halo group. Another […]

Continue reading


Microsoft Fails to Block O365 Email Spoofing Attacks

Microsoft Fails to Block O365 Email Spoofing Attacks

( 3 min read ) Microsoft is under the gun again for cyber fraud. 200 million+ users are at a risk of O365 email spoofing attacks. Security researchers have confirmed activity around the same. They have also identified some domain areas which will likely be the hot targets for these spoofing attacks. Office 365 users working in financial services, healthcare […]

Continue reading


Your Office 365 Credentials Are Vulnerable To This MS Teams Phishing Attack

MS Teams Phishing Attack Steals Office 365 Credentials

( 2 min read ) It is time you should probably review the safety of your Office 365 credentials. Recently, Microsoft Teams was targeted for a phishing attack. As many as 50,000 Office 365 users are vulnerable. As we see a rise in work from home culture, the use of Microsoft Teams for remote working collaboration has increased. Read further […]

Continue reading


Logix is a Microsoft Gold Partner in India

Logix Microsoft Gold Partner

( 2 min read ) What are our offerings as a Microsoft Gold Partner? For some time now, the corporate sector has been all about collaboration. Even before the pandemic began, corporates were keen to shift as much of their work on the cloud as possible. This allowed for remote access, enterprise messaging, offsite collaboration, and easy access for employees […]

Continue reading


Multi-Factor Authentication: The Devil Is In The Details

Multi-Factor Authentication leads to Microsoft Account Breach

( 2 min read ) Hackers attacked more than a million Microsoft Accounts ! If you need any more affirmation that your organisational security is indeed in your hands, then this case study is for you. Towards the beginning of the year, a shocking number of cases came to light, in which 1.2 million Microsoft accounts had been compromised. The […]

Continue reading


Microsoft Office 365 and Google G Suite Become Hot Targets for BEC

Office 365 and G Suite fall prey to BEC

( 3 min read ) FBI Reports Suggest BEC should be treated as seriously as Ransomware For businesses, the resource that needs to be protected with utmost care is capital. To that end, businesses that are aware of security concerns are often worried about protecting themselves against ransomware attacks, as these directly burn a hole in the company purse. We […]

Continue reading


Imperva Hacked

Cyber Threats

( 2 min read ) Imperva Hacked: API Keys, SSL Certificates Stolen Based in California, USA, Imperva offers Cybersecurity software and services designed to protect enterprise data, detect and block malicious attacks and other web-based security measures. However, Imperva itself suffered a cyber attack last week when a data breach affected users of Imperva’s Cloud Web Application Firewall (WAF). This […]

Continue reading


MS Word Trojan Malware out to steal your information

MS Word Malware Trojan

( 2 min read ) Alert: This Trojan Malware aimed at stealing bank details and personal information is spreading via infected Word documents. Which Malware? The Ursnif Trojan, a banking malware that has existed for more than a decade in some version or another since 2007, is back with a shrewder strategy. What is new This malware is aimed at […]

Continue reading


IMAP is the most exploited protocol. Office 365 and G Suite cloud accounts hacked

( 2 min read ) One thing leads to another like a domino, with access to leaked credentials dumps, the speed and efficiency of brute-force attacks has improved significantly. Hackers have been targeting legacy protocols with these stolen credentials dumps. IMAP (Internet Message Access Protocol) is the most abused protocol, IMAP is the protocol that bypasses Multi-Factor Authentication and lock-out […]

Continue reading