- All Categories
- Anti-phishing
- Anti-phishing solution
- CISO
- compromised
- Covid-19
- Cybercrime
- cybersecurity
- Darkweb
- Data Breach
- DKIM
- DMARC
- domain
- Domain name monitoring
- EASM
- Email spam
- hotlinking
- Impersonation
- Infographic
- keylogging
- Log4j
- Malware
- Online fraud
- OWASP Top 10
- Password
- Penetration Testing
- Pharming
- Phishing
- Phishing email
- phishing scam
- Phishing website
- RBI
- Research
- security
- security awareness
- Smishing
- Social Engineering
- Social Media
- Social Media Monitoring
- spear phishing
- SPF
- spoofing
- Takedown
- trojan
- Uncategorized
- Virus
- Vulnerability Assessment
- Weekly roundup
Top Cyber Attacks OF February 2024 – Devastating Organizations
In the ever-changing cybersecurity landscape, getting ahead of emerging threats is critical. As we delve into the cyber attacks of February 2024, […]
Top 10+ Dark Web Forums and Deep Web Forums – 2025
The dark web and deep web remain some of the most mysterious corners of the internet. While the deep web simply refers […]
Top 4 Data Breaches In January 2024 – Massive Leaks
The security team’s research on the breaches that occurred during January revealed that the data breaches in January 2024 alone surpassed the […]
Understanding the Power of Breach and Attack Simulation in 2025
In 2025, cyber threats are more sophisticated, frequent, and business-disruptive than ever before. Traditional security testing methods, while still valuable, can no […]
Ministry of Finance India Server Allegedly Breached, Access for Sale on Dark Web
Ministry of Finance India Server Allegedly Breached: During a routine course of our dark web monitoring today, our research team came across […]
Defending Against Spear Phishing Attacks: Our 6-Step Guide
Like every phishing campaign, spear-phishing campaigns are also used to fetch and collect your sensitive information, credentials and ask you to click […]
CERT – How it can help you build safe cyberspace in 2021?
Last year was tough and no matter which sector you work in or work for security was the most talked about. Well, […]
Mastering Zero Trust Security: Overcoming Implicit Trust Biases
Download FREE RBI Cyber Security Framework Checklist Internal threats are rising. Is your security up to the task? Before we move to […]
5 Steps to Take When a Data Breach Hits You
The majority of today’s successful businesses are well aware of common data protection concerns and place a great deal of confidence in […]
We scanned 5 million+ IP Addresses for database vulnerabilities : Analysis and Insights, 2020
Recently, in the month of August 2020, our team at TIKAJ conducted an extensive research to discover open Mongodb instances all over […]