- All Categories
- Anti-phishing
- Anti-phishing solution
- CISO
- compromised
- Covid-19
- Cybercrime
- cybersecurity
- Darkweb
- Data Breach
- DKIM
- DMARC
- domain
- Domain name monitoring
- EASM
- Email spam
- hotlinking
- Impersonation
- Infographic
- keylogging
- Log4j
- Malware
- Online fraud
- OWASP Top 10
- Password
- Penetration Testing
- Pharming
- Phishing
- Phishing email
- phishing scam
- Phishing website
- RBI
- Research
- security
- security awareness
- Smishing
- Social Engineering
- Social Media
- Social Media Monitoring
- spear phishing
- SPF
- spoofing
- Takedown
- trojan
- Uncategorized
- Virus
- Vulnerability Assessment
- Weekly roundup
Cybersecurity Bi-weekly Roundup: Week of 17th October
A bi-weekly roundup of the latest cybersecurity news, research, and awareness. As we move towards the end of Cybersecurity Awareness month, we’ve got you […]
Mastering Zero Trust Security: Overcoming Implicit Trust Biases
Download FREE RBI Cyber Security Framework Checklist Internal threats are rising. Is your security up to the task? Before we move to […]
SSL Certificates : 5 Mistakes to Avoid in Website
What is an SSL Certificate? SSL stands for Secure Sockets Layer, a global standard security technology that enables encrypted communication between a […]
6 ways to prevent social engineering attacks in you company
What are Social Engineering Attacks? Social engineering attacks are referred to as psychological manipulation to trick users into making security mistakes or […]
Why Cyber Security Awareness Training is Important Post Covid Era?
Cyber security threats are frequent, from ransomware and phishing to identity fraud and data breaches, scams needs to be addressed. As human […]
Olympics – Let the security round begin!
With the Olympics rolling into its third week, victory seems to be lining up for beloved Olympians from fencing to hockey, looks […]
Middle East Cyber Security concerns : 3 strategic approaches
The digital realm in the Middle East has seen a substantial evolution over recent years, with nations ardently embracing the perks of […]
5 Steps your e-commerce website needs today to stay secure
What is an E-commerce Website? E-Commerce websites in simple words are basically online portals that facilitate online transactions of goods and services […]
Why Am I Receiving Spam Email From My Own Email Address? Your Complete Guide 2025
Have you received a spam email from yourself or noticed a suspicious message that claims to be from your own address? That […]
Eliminate Rogue Applications: A Comprehensive 4-Step Guide
Rogue Apps might be the fastest-growing phenomenon among cybercriminals. They’re a constant problem in unauthorized and authorized mobile app stores, including Google […]
32TB data leak from privacy focused Parler : Jan 2021
Millions of videos, images and text posts collected and saved by a hacker and a team of archivists, from microblogging social network Parler have recently leaked into the public. The dataset leaked is over 32 TB and also includes posts from the January 6 Washington D.C. coup attempt.
Appointments on hold after Malware attack targeting Hospitals systems
Cyber attacks on hospitals have emerged as a significant cyber security risk in 2016, probably because hospitals have proven to be easy […]