Government Domains Breached – Official Government Data At Risk

Government Domains Breached

( 3 min read ) Share this:   Government officials are under threat of a phishing campaign as ids of official government domains such as @nic.in and @gov.in fell into the wrong hands. However, these government domains were not breached directly; the hackers got to the IDs of these domains through separate data breaches at Air India, Big Basket, and Dominos. These […]

Continue reading


India Faces 213 Weekly Ransomware Attacks

India Faces 213 Weekly Ransomware Attacks

( 2 min read ) Share this:   Following the 2020 email hacking riot, 2021 did not let us off easy. More and more emails are being targeted even this year, just that the traditional forms of phishing are replaced by ransomware attacks. Statistics show that India continues to face the heat of email infiltration, and has recorded 213 weekly ransomware attacks […]

Continue reading


Remote Access Trojan – Your Passwords at Risk

Remote Access Trojan (RAT)

( 3 min read ) Share this:   A new variant of an old trojan has now been activated, putting passwords and Windows PCs at risk. The Remote Access Trojan (RAT) is not new. It’s been around for quite a while. However, a new phishing campaign is currently delivering a customized variant of the remote access trojan, which aims to steal passwords […]

Continue reading


Security Threats in Banking and How to Handle Them

6 Security Threats in Banking

( 6 min read ) Share this:   Security threats in banking are becoming much more dangerous. Especially considering how varied and deceptive they have become. Food for thought: In one of the biggest cyberattacks, the data of 3.2 million debit cards used in India was stolen after a malware was injected in a back-end banking system in 2016. The government of […]

Continue reading


Reasons India Needs Better Cybersecurity in Banking

3 reasons India Needs Better Cybersecurity In Banking

( 3 min read ) Share this:   Banking in India is a very structured and regulated. Banks realize they’re dealing directly with citizens’ hard-earned money and take it seriously. However, Indian banks were no strangers to the recent digital revolution. The very nature of transactions changed, with internet banking, digital payments, and UPIs. Banks face newer threats. Financial regulators aren’t blind […]

Continue reading


Effective Endpoint Security

Effective Endpoint Security

( 4 min read ) Share this:   Endpoint security is a tricky subject, especially considering all the many devices that communicate within and outside a network. Add to that the requirement to connect to data remotely, from not-so-secure personal devices like mobiles and tablets, and the role of effective endpoint security becomes ever more crucial. The attack surface of an organization […]

Continue reading


Adaptive Cloud Security & Why You Need It

Adaptive Cloud Security

( 4 min read ) Share this:   Cloud computing brought with it an “always on” world. You can work from anywhere, access your data from anywhere, collaborate with remote teammates and store just about anything up on the cloud. Application servers, email servers, and database servers also shifted to the cloud, allowing for high availability, redundancy, and on-demand access. With these […]

Continue reading


Office365 Phishing Scam

Office365 Phishing Scam

( 3 min read ) Share this:   When your go-to productivity applications start getting caught up in phishing scams, it makes you take a step back and wonder whether any vendor’s application is truly safe without a third-party security service. Microsoft has been facing a lot of heat from the hackers, be it the Hafnium group or the Dark Halo group. […]

Continue reading


Microsoft Email Users Fall Prey to FedEx Phishing Emails

FedEx Phishing Emails

( 3 min read ) Share this:   Microsoft email users seem to be repeatedly be targeted by one phishing scam after another. One curious observation is that when Microsoft email users are targeted, the attacks are geared more towards the theft of credentials than performing malicious activities on the victim’s system. In a previous case involving SolarWinds, a similar password theft […]

Continue reading