In the past two years, phishing attacks have seen a steady rise and our experts predict that it’s only going to increase in the coming time. The staggering rise in indicates that there... Read more
In the last article, we stressed the importance of having an Incident Response Plan in place, while over years we have also elaborated on how threat actors have been using bots as a mode of... Read more
Cybersecurity in this era has taken a radical stage breaking its age-old limits of detecting threats such as worms and viruses. Earlier defense tactics were highly effective since the attack... Read more
Earlier this week, it had been reported in the media that Israeli spyware called Pegasus was used to spy on Indian journalists and activists earlier this year. Given the surveillance was car... Read more
A new easy to use Trojan has been winning the Trojan war amongst the other Trojan malware, proving to be quite popular with cybercriminals since it allows them to steal information like cred... Read more
The evolving cosmos of cyber threats have yet again brewed a new ransomware threat, which has been found by researchers. This new ransomware is dubbed as Medusa locker and it’s being a... Read more