Blog

Adopting Zero Trust Model

Adopting Zero Trust Model

From Zero to Hero Employees are not limited to the office building like in the old days. The remote working had effects on literally everything. Organizations today need a comprehensive security strategy to manage the complexities of securing the data. From perimeter-based security to Zero trust architecture, we have come a long way. Let us

Read More
Browser in The Browser – A new near invisible attack

Browser in The Browser – A new near invisible attack

While reading on the different types of phishing attacks, recently I came across an interesting article by mr.d0x. His article explores the type of attack called Browser in the Browser (BITB). It is a novel phishing attack that exploits the user by simulating a browser window within a browser to spoof a legitimate domain. In

Read More
How Attack Vectors Can Harm Your Company

How Attack Vectors Can Harm Your Company

Effects Of Cyber Attacks : In recent years, we’ve likely to hear more about cybersecurity problems affecting all sorts and scales of businesses. This year, remote employment played a big role in the breach and the average cost was USD 1.07 million in which compromised credentials were the most prevalent first attack vector – accounting

Read More
Phishing and DDoS attacks on Ukraine

Phishing and DDoS attacks on Ukraine

“In the last 12 months, Threat Analysis Group (TAG) has issued hundreds of government-backed attack warnings to Ukrainian users alerting them that they have been the target of government-backed hacking, largely emanating from Russia.” wrote Shane Huntley, Google’s TAG lead. TAG has seen activity like espionage to phishing attempts from several threat actors, including FancyBear

Read More