Best practices to secure your organisation

In tech industries critical messages need to be repeated often. Sometimes they can be complicated, so we reach…

Zero Trust model shows signs of maturity as Dx efforts intensify: Study

As the emphasis on digital transformation has increased, the Zero Trust concept is increasingly gaining traction…

Zero Trust model shows signs of maturity as Dx efforts intensify: Study

As the emphasis on digital transformation has increased, the Zero Trust concept is increasingly gaining traction…

75% of India’s top 100 Android apps are vulnerable: Study

Cybercrime industry thriving on ransomware DIY tools: Study

Even cybercriminals are embracing subscription-based business models aggressively, as many illicit organisations are now providing Ransomware-as-a-Service…

To pay or not to pay ransom settlements

Ransomware is one of the top threats facing organizations and individuals today. In fact, according to…

Over 2K victims hacked via Microsoft signature verification, India 3rd most affected

A new campaign exploited Microsoft’s digital signature verification to steal user credentials and sensitive information of over…

In 2021 almost half of investigated security incidents were connected to ransomware

Incident response (IR) is when companies call in a team in the aftermath of a breach…

Inform us if you suspect you are a Pegasus victim: SC probe panel

Log4j,the bug which poses risk to millions of devices