- All Categories
- Anti-phishing
- Anti-phishing solution
- CISO
- compromised
- Covid-19
- Cybercrime
- cybersecurity
- Darkweb
- Data Breach
- DKIM
- DMARC
- domain
- Domain name monitoring
- EASM
- Email spam
- hotlinking
- Impersonation
- Infographic
- keylogging
- Log4j
- Malware
- Online fraud
- OWASP Top 10
- Password
- Penetration Testing
- Pharming
- Phishing
- Phishing email
- phishing scam
- Phishing website
- RBI
- Research
- security
- security awareness
- Smishing
- Social Engineering
- Social Media
- Social Media Monitoring
- spear phishing
- SPF
- spoofing
- Takedown
- trojan
- Uncategorized
- Virus
- Vulnerability Assessment
- Weekly roundup
5 Steps to Take When a Data Breach Hits You
The majority of today’s successful businesses are well aware of common data protection concerns and place a great deal of confidence in […]
Managing Cyber Threats through Effective Governance
Cybersecurity governance is the mechanism by which cybersecurity risk decisions are taken and efficient systems are designed to handle the risk to […]
Cyber security In the Age Of COVID-19
The COVID-19 pandemic created chaos worldwide, providing an opening for cybercriminals to exploit vulnerabilities, and emphasizing the need for robust cyber security […]
We scanned 5 million+ IP Addresses for database vulnerabilities : Analysis and Insights, 2020
Recently, in the month of August 2020, our team at TIKAJ conducted an extensive research to discover open Mongodb instances all over […]
Be prudent towards cybersecurity before its too late
Hollywood movies give us an insight as to how it is going to feel when someone puts a gun on your head […]
Top Enterprise Security Best Practices to Safeguard Your Organization
Enterprise security is essential for safeguarding both your data and your company. The following ten enterprise security best practices should be used […]
Cyber-crime: Payment facilitators falling prey to the scammers
Millions of complaints get registered around the world to the cyber-security regarding the cyber-crime. In fact, many fraudulent activities may not even […]