- All Categories
- Anti-phishing
- Anti-phishing solution
- CISO
- compromised
- Covid-19
- Cybercrime
- cybersecurity
- Darkweb
- Data Breach
- DKIM
- DMARC
- domain
- Domain name monitoring
- EASM
- Email spam
- hotlinking
- Impersonation
- Infographic
- keylogging
- Log4j
- Malware
- Online fraud
- OWASP Top 10
- Password
- Penetration Testing
- Pharming
- Phishing
- Phishing email
- phishing scam
- Phishing website
- RBI
- Research
- security
- security awareness
- Smishing
- Social Engineering
- Social Media
- Social Media Monitoring
- spear phishing
- SPF
- spoofing
- Takedown
- trojan
- Uncategorized
- Virus
- Vulnerability Assessment
- Weekly roundup
Security is not a product, but a process !
A lot of corporations are investing massive sums of money in security. But security breaches continue to happen again and again. And […]
How to discern Santa disguised phishers this holiday?
Holiday season is around which means the season of sending and receiving gifts and pleasantries is here as well. According to a […]
Beware: Emotet Malware Spreading via Greta Thunberg Phishing Emails
A global spam email scheme has been discovered which is using Swedish environmental activist Greta Thunberg themed emails to lure users. Spam […]
Phishing: Unveiling the Dark Side of Corporate Cybersecurity Risks
“Success is how high you bounce when you hit bottom.” – General George Patton Well it seems like the youths of India […]
Modern phishing baits – upcoming genres
They say creativity is a great tool for problem-solving. They also say creativity makes you sell your stuff faster. These days, though, […]
DMARC Policy: Essential Guide
DMARC that stands for (Domain-based Message Authentication, Reporting, and Conformance) is a type of email protocol that uses SPF (Sender Policy Framework) […]
Top 5 Anti-Phishing Practices Every Organization Should Implement
Implementation of a successful security strategy for business is an imperturbable engagement and you can’t ignore it, as data is a valuable […]
What is Ransomware?
Ransomware is a type of malicious software or Malware. In other words, we can say it is a subset of Malware, it […]
What is Phishing? How this attack works and prevention against them?
Phishing is one of the most dangerous threats to organisations. The sender of a phishing mail pretends to be a trusted person […]
What are Phishing Emails and its types?
Email Phishing, also referred to as junk email, is unsolicited messages sent in bulk by email. Spamming of Email refers to the […]
What are the benefits of Social Media Monitoring?
Social Media Monitoring is the practice of listening to product-related social networking posts, mutual references and remarks. In other terms, it’s about […]
What is Social Media Monitoring? How it works? It’s impacts?
Monitoring of social media is the method of recognizing and deciding what is said about a brand, person or commodity across various […]