The Phishing surge amidst Covid 19
Did you mask your network as well during COVID-19? COVID-19 continues to significantly embolden cybercriminals’ phishing and fraud efforts, and there is […]
What is SPF ?
Sender Policy Framework (SPF) is an email validation system designed to detect and block forged or spoofed emails. This is done by verifying […]
32TB data leak from privacy focused Parler : Jan 2021
Millions of videos, images and text posts collected and saved by a hacker and a team of archivists, from microblogging social network Parler have recently leaked into the public. The dataset leaked is over 32 TB and also includes posts from the January 6 Washington D.C. coup attempt.
OWASP TOP 10 Explained: Injection
Injection attacks apply to a wide class of attack vectors that enable an attacker to supply untrusted information to a program that […]
Security is not a product, but a process !
A lot of corporations are investing massive sums of money in security. But security breaches continue to happen again and again. And […]
How to discern Santa disguised phishers this holiday?
Holiday season is around which means the season of sending and receiving gifts and pleasantries is here as well. According to a […]
Emotet malware being presented to people this Christmas, through Greta Thunberg themed Phishing emails
A global spam email scheme has been discovered which is using Swedish environmental activist Greta Thunberg themed emails to lure users. Spam […]
Phishing: The emergence of sinister side of the corporate world
“Success is how high you bounce when you hit bottom.” – General George Patton Well it seems like the youths of India […]
Modern phishing baits – upcoming genres
They say creativity is a great tool for problem-solving. They also say creativity makes you sell your stuff faster. These days, though, […]
DMARC Policy: Essential Guide
DMARC that stands for (Domain-based Message Authentication, Reporting, and Conformance) is a type of email protocol that uses SPF (Sender Policy Framework) […]
Five Anti-Phishing practices to be implemented in your organisation.
Implementation of a successful security strategy for business is an imperturbable engagement and you can’t ignore it, as data is a valuable […]
What is Ransomware?
Ransomware is a type of malicious software or Malware. In other words, we can say it is a subset of Malware, it […]