Why you must switch to HTTPS right now?

Secure your website with HTTPS

Share this:    It is high time to switch to HTTPS. The most important question lingering here is Why to move to HTTPS? To understand why, first we need to understand what is HTTPS? The Hypertext Transfer Protocol (HTTP) is an application protocol for communication over distributed, collaborative, and hypermedia information systems. HTTPS (HTTP Secure) is an adaptation of the Hypertext Transfer Protocol (HTTP) for secure communication over a computer network, and […]

Continue reading


Avoiding the rising DNS Binding Attacks for the smart devices

Is your device safe from DNS Rebinding Attack_

Share this:    What is a DNS Rebinding Attack? DNS Rebinding Attacks are where the attacker tricks the user into binding with malicious websites and then making the user browser or device access unintended domains. Such attacks are normally used to compromise the system and exploit it as proxy for attacking the internal network. How DNS Rebinding […]

Continue reading


FelixRoot Backdoor Malware Resurfaced in a recent Campaign

Felixroot Backdoor

Share this:    Felixroot Backdoor was first spotted in September 2017 in Ukraine spreading through pernicious banking documents with macros downloading the back door of C&C server. Felixroot Backdoor malware campaign has resurfaced using Microsft Office vulnerabilities CVE-2017-0199 and CVE-2017-11882 to compromise the victim’s windows computers. It is being distributed by the file name “Seminal.rtf” claiming to provide information […]

Continue reading


FlawedAmmyy RAT being delivered via TA505 email spam campaigns

FlawedAmmyy RAT

Share this:    Always be cautious while opening email attachments. Recently, hackers have been sending weaponized PDFs containing malicious SettingContent-ms files containing FlawedAmmyy RAT, reported by researchers at SecurityOps. SettingContent-ms file opens the Control Panel for the user. The interesting aspect of this file is the <DeepLink> element in the schema. This element takes any binary with parameters and […]

Continue reading


Emotet Malware spreading extensively via Microsoft Documents in emails

Emotet

Share this:    Hackers are trying to deliver Emotet malware by attaching it to Microsoft Office document via email. Many US citizens were affected by this around their recent Independence Day, by receiving an email with a document named ‘Greeting Card’ containing malicious malware. EMOTET is a banking Trojan first seen in 2014 targeting customers of German […]

Continue reading


Cloud Technology has brought in a paradigm shift in Storing Data

Cloud Technology has brought a paradigm shift in storing Data

Share this:    Cloud Computing has flourished enormously over the past few years. It has changed the concept of data storage altogether. Every day new innovations and developments are made in cloud computing. Here are some major points how cloud computing is reshaping the IT world: Storing data safely with minimal human effort Data is being stored […]

Continue reading


Indian BFSI Sector needs to be prepared for upcoming data protection laws

Data ProtectionLaws for Indians

Share this:    The increase in financial crimes is not only a threat to BFSI (Banking, Financial Services and Insurance) companies but it also touches the daily life of millions of people across the globe. According to a recent study, only 1% of the $2.4 trillion laundered through international financial systems is believed to be confiscated. According […]

Continue reading


What is DMARC? Why is it important for your business?

DMARC policies

Share this:    What is DMARC? DMARC (Domain-based Message Authentication, Reporting and Conformance) is a technology advancement in preventing email and domain spoofing. It ensures that emails go through a domain based check and then sent to the recipient. It uses DKIM and SPF standards along with additional standards of its own. It is really challenging to […]

Continue reading