A lot of scams are happening via fake email IDs. Whether you are an IT employee, bank employee or a […]
A lot of scams are happening via fake email IDs. Whether you are an IT employee, bank employee or a […]
Technology is evolving rapidly and so are the cyber risks. It is a big responsibility on the shoulders of CXO […]
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could […]
A big cryptojacking attack took place first time in the country last month. The target was the Aditya Birla Group […]
The DNS is essentially a phonebook for the Internet’s domain names. When any device makes the first request over the […]
Microsoft’s Advanced Threat Protection (ATP) includes a feature called Safe Links. Office 365 Safe Links basically curb all the malicious […]
Cyber criminals seem to have hacked the EPFO data which holds information like name, Aadhar card number, bank details of […]
Recovery Point Objective (RPO) and Recovery Time Objective (RTO) are 2 most important parameters for a disaster recovery and business […]
Be careful when you receive attachments to an email, it can be an entry point to Formbook Malware. Formbook malware […]
It is high time for CIOs to run a customer centric business. In today’s world, where there are so many […]