Top 5 Phishing Awareness Tips

October 1, 2019 - 3 mins read

  Cyber-criminals have advanced in delivering spam, malware, launching phishing attacks and various hacking practices to steal user’s data for…

How Malware Attack Caused Axing of SEPTA Online Store?

September 29, 2019 - 3 mins read

Web skimming led US Transport Authority to shut down its online store. The Southeastern Pennsylvania Transport Authority (SEPTA) recently faced…

Woman loses Rs. 95,000 by calling fake Swiggy Go helpline

September 13, 2019 - 3 mins read

Recently, Swiggy has launched ‘Swiggy Go’, its pickup and drop service to send packages anywhere in the city. Bengaluru has…

1 out of every 99 mails is a phishing email

September 11, 2019 - 4 mins read

Imagine you start afresh while accommodating yourself with your daily task list. You are going through your emails when see…

Why is Cyber Security in Banking Important?

September 3, 2019 - 3 mins read

Some of the largest banks tripled their cyber-defence budgets during last three to four years. This has been done among…

Rat Attack: Phishing attack that deploys two trojans

August 31, 2019 - 4 mins read

A threat actor has been found to leverage two of the most popular remote access trojans including RevengeRAT and Orcus…

European Central Bank’s website shuts down infinitely

August 17, 2019 - 4 mins read

European Central Bank has recently become the victim of a cyber attack. The attack was successfully deployed by injecting a…

Why Cyber Security in Banking is Important?

August 15, 2019 - 4 mins read

Since the last decade, cyber attackers have especially affected businesses that depend on computerized technology for conducting their daily business.…

What is the Importance of Vulnerability Assessment?

August 7, 2019 - 4 mins read

Vulnerabilities are the anomalies such as programming errors or configuration issues of the system. Attackers exploit the weaknesses in the…

How VAPT Prevents Privilege Escalation Attacks?

August 2, 2019 - 4 mins read

Privileges are the permissions or right given to the user or group of systems for performing tasks that are needed…

Recent Blogs