Blog

TOP 10 CYBER SECURITY BEST PRACTICES TO FOLLOW IN 2022

TOP 10 CYBER SECURITY BEST PRACTICES TO FOLLOW IN 2022

Educate your workforce about the importance of security and about the highly evolving threat landscape. Make these below mentioned practices a part of your work culture to prevent your organization from ransomware attacks: 1.Multi-Factor Authentication Multi-Factor Authentication is one of the most effective controls in preventing unauthorized access by bad actors. Authentication uses two or more

Read More
Android malware BRATA strikes again with new dangerous capabilities

Android malware BRATA strikes again with new dangerous capabilities

Android malware BRATA gained new dangerous features in the latest version like GPS tracking, the ability to use various communication channels and factory reset to hide fraudulent wire transfer. BRATA – Brazilian Remote Access Tool (RAT) Android was a spyware, which was later known to be a banking trojan. This spyware was found out by

Read More
Anatomy of ransomware attacks

Anatomy of ransomware attacks

As we discussed in our previous blog “What is Ransomware”, let us look into the anatomy of ransomware attacks today. Ransomware attacks have been very high in all fields, and many have lost so much of money. In this section, different stages of ransomware attacks are explained. There are five stages of attacks in general,

Read More
Log4j related RCE flaw found in H2 Database – Earns critical rating

Log4j related RCE flaw found in H2 Database – Earns critical rating

Researchers have found that cyberattacks surged by 50% year over year in 2021, peaking in December due to a log4j exploit frenzy. Millions of Log4j targeted attacks have been recorded per hour since the bug was detected last month. The result was a global peak of 925 cyberattacks per week. Source: CPR Now in the

Read More