Estimated reading time: 13 minutes
Seqrite Labs APT team has uncovered new tactics of Pakistan-linked SideCopy APT deployed since the last week of December 2024. The group has expanded its scope of targeting beyond Indian government, defence, maritime sectors, and university students to now...
Estimated reading time: 3 minutes
The Digital Personal Data Protection (DPDP) Act 2023 marks a pivotal shift in India’s data protection framework, setting clear guidelines for managing personal data. For the Banking, Financial Services, and Insurance (BFSI) sectors, which process vast volumes of sensitive...
Estimated reading time: 2 minutes
As organizations navigate the evolving threat landscape, traditional security models like VPNs and legacy access solutions are proving insufficient. Zero Trust Network Access (ZTNA) has emerged as a modern alternative that enhances security while improving user experience. Let’s explore...
Estimated reading time: 5 minutes
The “GrassCall” malware campaign represents an advanced social engineering attack carried out by a Russian-speaking cyber-criminal organization referred to as “Crazy Evil,” with its subgroup “kevland” leading the operation. The campaign specifically targets job seekers in the cryptocurrency and...
Estimated reading time: 3 minutes
Cyber criminals in India are constantly evolving their tactics to exploit fear and trust. One alarming trend is the “Digital Arrest Scam,” where fraudsters impersonate law enforcement agencies or government officials to extort money or sensitive information. These scams...
Estimated reading time: 3 minutes
Phishing has drastically transformed from its early days as a simple scam targeting unwary email users. Modern phishing techniques—dubbed “Phishing 2.0″—are more complex, highly tailored, and designed to bypass even the most robust security systems. In this blog, we’ll...
Estimated reading time: 3 minutes
In today’s digital landscape, where cyber threats are evolving rapidly, organizations must rethink their approach to network security. Traditional security models, such as VPNs and perimeter-based defenses, are no longer sufficient to protect against sophisticated cyberattacks. This is where...
Estimated reading time: 3 minutes
We are observing a rise in fake websites offering investment-related services. Many of these impersonate well-known brands by creating replicas of their official websites. Unsuspecting visitors interact with these fake websites, fall victim to scams, and lose large sums...