In the past two years, phishing attacks have seen a steady rise and our experts predict that it’s only going to increase in the coming time. The staggering rise in indicates that there are more attacks happening due to ransomware. There ha... Read more
In the last article, we stressed the importance of having an Incident Response Plan in place, while over years we have also elaborated on how threat actors have been using bots as a mode of attack against their victim. In this article, we wanted... Read more
Cybersecurity in this era has taken a radical stage breaking its age-old limits of detecting threats such as worms and viruses. Earlier defense tactics were highly effective since the attacks were relatively simple. Since protection is not enoug... Read more
Earlier this week, it had been reported in the media that Israeli spyware called Pegasus was used to spy on Indian journalists and activists earlier this year. Given the surveillance was carried out by the popular messaging app Whatsapp, it has... Read more
A new easy to use Trojan has been winning the Trojan war amongst the other Trojan malware, proving to be quite popular with cybercriminals since it allows them to steal information like credit card data, passwords and even cryptocurrency in a mu... Read more