Search


Preparing for Cyberwar - a National Perspective
Cyberspace has changed many old concepts. In this globalised world everyone is neighbour of other.
-
Sep 18, 202413 min read


Beware of QR Code Scam: In name Ram Temple Donation
Shri Vinod Bansal, National Spokes person of Vishwa Hindu Parishad has lodge an FIR along with intimation to MHA and UP Police about some...
-
Dec 31, 20231 min read


Proceeds of Cybercrime and Orders of Kerala High Court
Cyber criminals use multiple approaches to hide their proceeds of crime, including using of money mules, money tumbling & rotation,...
-
Oct 20, 20235 min read


Nation State Attack Detected After 2 Years of its operation
Wintapix / PowerExhange Affected platforms: Windows Impacted parties: Windows Users Impact: Allows remote code execution and persistent...
-
May 30, 20233 min read


Indian under Cyber Terror Attacks
Since Soros has exposed his desire for regime change in India, there has been increased activities of Anti-India forces. Then on 31st...
-
Apr 12, 20237 min read


Google Issued an Alarm: Skilled Hackers can access your mobile without your intervention
Google’s security research unit is sounding the alarm on a set of vulnerabilities it found in Samsung’s Exynos modems chips included in...
-
Mar 18, 20232 min read


Who should be accountable for AIIMS Poor Cyber Security?
On 23rd November 2022, AIIMS made a formal announcement that its servers (and therefore online services) were down due to ransomware...
-
Dec 8, 20229 min read


Several OEMs’ Core Android Certificates Compromised
On 11th November 2022, Google officials issued a statement: "A platform certificate is the application signing certificate used to...
-
Dec 4, 20222 min read


National Cyber Security Agenda
(In May 2014, when BJP/NDA headed by Sh Narendra Modi as the Prime Minister took over the responsibility to lead our great nation to the...
-
Sep 10, 20225 min read


What got changed with CERT-In Directions?
If you want support or consultancy to implement CERT-In Directions, please visit Mayakshi.com In India people suffer from ‘Helmet...
-
Aug 21, 20223 min read


Which Cyber Security Audit approach is right?
The dependency on technology has increased to a level where Cyber risk may cause severe damage to a company financially and...
-
Jun 13, 20223 min read


The intentions are in the right direction but directions are not right
CERT-In Directions No. 20(3)/2022 dated 28th April 2022 Note: (i) For complete CERT-In directions and other legal documents Click here....
-
May 8, 202211 min read


TECHNO-PARALEGAL ANALYSIS OF THE CRIMINAL PROCEDURE (IDENTIFICATION) BILL, 2022
On 24th March 2022, the home minister Shri Amit Shah, introduced the Criminal Procedure (Identification) Bill, 2022 in Lok Sabha. As...
-
Mar 31, 202211 min read


Understanding Technologies for Defending Cyber Assets from Ransomware and Cyber Espionage
Executing a Ransomware attack on a reasonably defended organisation is not easy, as many activities that lead to success. It required...
-
Feb 13, 202217 min read


How to memorise secret numbers or password - Use कटपयादि संख्या
ka·ṭa·pa·yā·di system of numerical notation is an ancient Indian alphasyllabic numeral system to depict letters to numerals for easy...
-
Feb 6, 20225 min read


Ransomware as Primary Cyberwar Weapon
Estonia is believed to have been the first country affected by a cyberwar offensive, in which Russians (backed or unbacked by the Russian...
-
Jan 26, 20225 min read


Defining Cyberspace Jurisdiction - A prerequisite to pronounce any Aggression to be an act Cyberwar
Introduction The world is in the state of strategic transformation as it transcends from industrial age warfare to information age...
-
Jan 20, 20225 min read


Recognising Act of Cyberwar from Cyber Crime – A prerequisite for National Cyber Security
The world is facing nation state supported Advanced Persistent Threats as well as organised ransomware attacks. The supply chain attack...
-
Jan 12, 20223 min read


Cybersecurity & the Companies Act, 2013
No one can deny that Cybersecurity risk to any corporate is real and present. According to a report prepared by CISCO in Aug 2021, 74% of...
-
Jan 9, 20226 min read


Making Management Understand "Log4j" Impact
IMPORTANT NOTE: Our XDR soultion provides protection & detection for Log4j across both networks and endpoints. Contact us "The Log4j...
-
Dec 19, 20217 min read