- All Categories
- Anti-phishing
- Anti-phishing solution
- CISO
- compromised
- Covid-19
- Cybercrime
- cybersecurity
- Darkweb
- Data Breach
- DKIM
- DMARC
- domain
- Domain name monitoring
- EASM
- Email spam
- hotlinking
- Impersonation
- Infographic
- keylogging
- Log4j
- Malware
- Online fraud
- OWASP Top 10
- Password
- Penetration Testing
- Pharming
- Phishing
- Phishing email
- phishing scam
- Phishing website
- RBI
- Research
- security
- security awareness
- Smishing
- Social Engineering
- Social Media
- Social Media Monitoring
- spear phishing
- SPF
- spoofing
- Takedown
- trojan
- Uncategorized
- Virus
- Vulnerability Assessment
- Weekly roundup
Top Cyber Attacks OF February 2024 – Devastating Organizations
In the ever-changing cybersecurity landscape, getting ahead of emerging threats is critical. As we delve into the cyber attacks of February 2024, […]
Top Dark Web Forums – Easy Access – 2025
From leaked credentials to stolen corporate data, the dark web thrives as a hidden economy of cybercrime. Within this underground ecosystem, forums […]
Top 4 Data Breaches In January 2024 – Massive Leaks
The security team’s research on the breaches that occurred during January revealed that the data breaches in January 2024 alone surpassed the […]
Understanding the Power of Breach and Attack Simulation in 2024
Click here to Download FREE Breach and Attack Stimulation Guide Introduction to Breach and Attack Simulation (BAS) Breach and Attack Simulation (BAS) […]
Ministry of Finance India Server Allegedly Breached, Access for Sale on Dark Web
Ministry of Finance India Server Allegedly Breached: During a routine course of our dark web monitoring today, our research team came across […]
Know-How : We Fought back a Spear Phishing Attack in 6 Easy Steps!
Like every phishing campaign, spear-phishing campaigns are also used to fetch and collect your sensitive information, credentials and ask you to click […]
CERT – How it can help you build safe cyberspace in 2021?
Last year was tough and no matter which sector you work in or work for security was the most talked about. Well, […]
7 principles of Zero Trust Security: Break the implicit trust biases!
Download FREE RBI Cyber Security Framework Checklist Internal threats are rising. Is your security up to the task? Before we move to […]
5 Steps to Take When a Data Breach Hits You
The majority of today’s successful businesses are well aware of common data protection concerns and place a great deal of confidence in […]
We scanned 5 million+ IP Addresses for database vulnerabilities : Analysis and Insights, 2020
Recently, in the month of August 2020, our team at TIKAJ conducted an extensive research to discover open Mongodb instances all over […]