Blog

Best practices for Data Loss Prevention

Best practices for Data Loss Prevention

We know that data is what drives the technology today. Data is a distinctive type of information that is collected and translated for a specific purpose. If the data is not formatted in the right way, it does not provide any value to both humans and computers. Data is considered sensitive when it gives classified

Read More
Trojans are targeting Microsoft teams

Trojans are targeting Microsoft teams

A recent harmful campaign is taking control over end-user computers by placing malicious documents in Microsoft Teams chat. Cybercriminals have targeted Microsoft’s omnipresent document creation and sharing suite – the legacy Office and its cloud-based successor Office 365 – with assaults on individual apps like PowerPoint, as well as business email compromise and other schemes.

Read More
Hackers Infecting PCs With Windows Update Malware

Hackers Infecting PCs With Windows Update Malware

Trojanized version of IDA Pro: The North Korea state-sponsored group- Lazarus used a trojanized pirated version of the popular IDA Pro reverse engineering software (which translates machine language into assembly language) to target security researchers with available backdoors and remote access trojans. IDA Pro enables security researchers to analyze the malicious and debugger to detect

Read More
Ransomware Protection and Response

Ransomware Protection and Response

Over the past weeks, we discussed What is ransomware, and the Anatomy of ransomware attacks. Now, let us look into some ways to protect yourself from ransomware and how to respond if you fall victim to any. According to IBM, ransomware attacks are very high which contributes up to more than 23% of total cybersecurity

Read More