Search


Preparing for Cyberwar - a National Perspective
Cyberspace has changed many old concepts. In this globalised world everyone is neighbour of other.
-
Sep 18, 202413 min read
403 views
0 comments

Nation State Attack Detected After 2 Years of its operation
Wintapix / PowerExhange Affected platforms: Windows Impacted parties: Windows Users Impact: Allows remote code execution and persistent...
-
May 30, 20233 min read
37 views
0 comments

Indian under Cyber Terror Attacks
Since Soros has exposed his desire for regime change in India, there has been increased activities of Anti-India forces. Then on 31st...
-
Apr 12, 20237 min read
560 views
0 comments

Google Issued an Alarm: Skilled Hackers can access your mobile without your intervention
Google’s security research unit is sounding the alarm on a set of vulnerabilities it found in Samsung’s Exynos modems chips included in...
-
Mar 18, 20232 min read
672 views
0 comments

Who should be accountable for AIIMS Poor Cyber Security?
On 23rd November 2022, AIIMS made a formal announcement that its servers (and therefore online services) were down due to ransomware...
-
Dec 8, 20229 min read
545 views
0 comments


Understanding Technologies for Defending Cyber Assets from Ransomware and Cyber Espionage
Executing a Ransomware attack on a reasonably defended organisation is not easy, as many activities that lead to success. It required...
-
Feb 13, 202217 min read
191 views
0 comments


Defining Cyberspace Jurisdiction - A prerequisite to pronounce any Aggression to be an act Cyberwar
Introduction The world is in the state of strategic transformation as it transcends from industrial age warfare to information age...
-
Jan 20, 20225 min read
36 views
0 comments


Recognising Act of Cyberwar from Cyber Crime – A prerequisite for National Cyber Security
The world is facing nation state supported Advanced Persistent Threats as well as organised ransomware attacks. The supply chain attack...
-
Jan 12, 20223 min read
76 views
0 comments


Making Management Understand "Log4j" Impact
IMPORTANT NOTE: Our XDR soultion provides protection & detection for Log4j across both networks and endpoints. Contact us "The Log4j...
-
Dec 19, 20217 min read
364 views
1 comment


Raids at FSB Russia, Moscow City for Crypto Exchange Supporting Ransomware
FSB Russia right now raids Moscow City rebellious Federation Tower, the axis of crypto evil, according to Bloomberg, home to OTC...
-
Nov 19, 20211 min read
55 views
0 comments


BlackMatter Ransomware
BlackMatter Screenshot Ransomware-as-a-service (RaaS) means that any individual or entity can use the services to carry out ransomware...
-
Nov 15, 20212 min read
45 views
0 comments


The Proposed Cyber Security Act of India
On 18th Oct 2021, while inaugurating the services of Techno-Para-Legal by Mayakshi, Lt Gen (Dr) Rajesh Pant, National Information...
-
Oct 21, 20213 min read
242 views
0 comments


Defining Rules of Cyber Engagement (RoCyE)
Will the recent attack on Indian defence and government officials under operation Armour Piercer (click here to read details) amount to...
-
Oct 5, 20213 min read
96 views
0 comments


Why does India urgently need a new National Cyber Security Policy?
The nation have been hearing for the last two years that a new National Cyber Security Policy is ready and likely to be announced any...
-
Oct 2, 20212 min read
120 views
0 comments


Operation:Armor Piercer (Detected by CISCO's TALOS) attacked Indian Defence and Government Official
Operation:Armor Piercer (Detected by CISCO's TALOS
-
Sep 24, 20212 min read
534 views
1 comment