Accenture in The Crosshairs of Lockbit Ransomware Attack

Lockbit Ransomware Attack

( 3 min read ) A well-known consulting firm, Accenture, has fallen prey to a ransomware attack by the infamous Lockbit group. The Lockbit ransomware attack, infamously called Lockbit 2.0, has resulted in a data leak of Accenture’s encrypted data, which is currently under the duress of the hacker gang. Lockbit is blackmailing Accenture that it will publish the data […]

Continue reading


Cisco Secure Email Cloud Mailbox – Simplified Email Security for Small Businesses

Cisco Secure Email Cloud Mailbox For Simplified Email Security

( 2 min read ) When it comes to email security, small businesses especially have to follow the ‘Do It Right the First Time’ mantra. Enterprises of this scale need to concentrate on growing their businesses, boosting their productivity, and adapting to remote collaboration. Not only can they not afford to fall prey to an email attack, they also can’t […]

Continue reading


Cisco Reports On Rising Crypto Mining Activites

Rising Crypto Mining Activites

( 2 min read ) Microsoft Exchange servers have been targeted time and again for crypto mining ever since Bitcoin and cryptocurrency gained footing in the digital transaction world. The good news for our Logix Cisco Email ATP customers is that they’re protected against Lemon Duck Crypto Mining Malware. Why is crypto mining dangerous? The term crypto mining means gaining […]

Continue reading


Remote Access Trojan – Your Passwords at Risk

Remote Access Trojan (RAT)

( 3 min read ) A new variant of an old trojan has now been activated, putting passwords and Windows PCs at risk. The Remote Access Trojan (RAT) is not new. It’s been around for quite a while. However, a new phishing campaign is currently delivering a customized variant of the remote access trojan, which aims to steal passwords and […]

Continue reading


Security Threats in Banking and How to Handle Them

6 Security Threats in Banking

( 6 min read ) Security threats in banking are becoming much more dangerous. Especially considering how varied and deceptive they have become. Food for thought: In one of the biggest cyberattacks, the data of 3.2 million debit cards used in India was stolen after a malware was injected in a back-end banking system in 2016. The government of India […]

Continue reading


Reasons India Needs Better Cybersecurity in Banking

3 reasons India Needs Better Cybersecurity In Banking

( 3 min read ) Banking in India is a very structured and regulated. Banks realize they’re dealing directly with citizens’ hard-earned money and take it seriously. However, Indian banks were no strangers to the recent digital revolution. The very nature of transactions changed, with internet banking, digital payments, and UPIs. Banks face newer threats. Financial regulators aren’t blind to […]

Continue reading


Effective Endpoint Security

Effective Endpoint Security

( 4 min read ) Endpoint security is a tricky subject, especially considering all the many devices that communicate within and outside a network. Add to that the requirement to connect to data remotely, from not-so-secure personal devices like mobiles and tablets, and the role of effective endpoint security becomes ever more crucial. The attack surface of an organization (comprising […]

Continue reading


Adaptive Cloud Security & Why You Need It

Adaptive Cloud Security

( 4 min read ) Cloud computing brought with it an “always on” world. You can work from anywhere, access your data from anywhere, collaborate with remote teammates and store just about anything up on the cloud. Application servers, email servers, and database servers also shifted to the cloud, allowing for high availability, redundancy, and on-demand access. With these factors […]

Continue reading