Search


Preparing for Cyberwar - a National Perspective
Cyberspace has changed many old concepts. In this globalised world everyone is neighbour of other.
-
Sep 18, 202413 min read
403 views
0 comments


Nation State Attack Detected After 2 Years of its operation
Wintapix / PowerExhange Affected platforms: Windows Impacted parties: Windows Users Impact: Allows remote code execution and persistent...
-
May 30, 20233 min read
37 views
0 comments


Aadhaar or Adhar?
NOTE: I wrote this Article for vijayvaani.com on 06th April 2017(link at the bottom), and I stand by my article. In this, I am not...
-
Nov 29, 20229 min read
34 views
0 comments


What got changed with CERT-In Directions?
If you want support or consultancy to implement CERT-In Directions, please visit Mayakshi.com In India people suffer from ‘Helmet...
-
Aug 21, 20223 min read
757 views
0 comments


The intentions are in the right direction but directions are not right
CERT-In Directions No. 20(3)/2022 dated 28th April 2022 Note: (i) For complete CERT-In directions and other legal documents Click here....
-
May 8, 202211 min read
694 views
0 comments


Understanding Technologies for Defending Cyber Assets from Ransomware and Cyber Espionage
Executing a Ransomware attack on a reasonably defended organisation is not easy, as many activities that lead to success. It required...
-
Feb 13, 202217 min read
191 views
0 comments


Ransomware as Primary Cyberwar Weapon
Estonia is believed to have been the first country affected by a cyberwar offensive, in which Russians (backed or unbacked by the Russian...
-
Jan 26, 20225 min read
111 views
0 comments


Defining Cyberspace Jurisdiction - A prerequisite to pronounce any Aggression to be an act Cyberwar
Introduction The world is in the state of strategic transformation as it transcends from industrial age warfare to information age...
-
Jan 20, 20225 min read
36 views
0 comments


Recognising Act of Cyberwar from Cyber Crime – A prerequisite for National Cyber Security
The world is facing nation state supported Advanced Persistent Threats as well as organised ransomware attacks. The supply chain attack...
-
Jan 12, 20223 min read
76 views
0 comments


Making Management Understand "Log4j" Impact
IMPORTANT NOTE: Our XDR soultion provides protection & detection for Log4j across both networks and endpoints. Contact us "The Log4j...
-
Dec 19, 20217 min read
364 views
1 comment


Cognitive Warfare and Reordering Mass Consciousness “Cambridge Analytica and beyond”
Original Article was written in May 2019 but remained unpublished. "We used to be in the business of mindbending for political purposes,...
-
Nov 25, 202115 min read
245 views
0 comments


The Proposed Cyber Security Act of India
On 18th Oct 2021, while inaugurating the services of Techno-Para-Legal by Mayakshi, Lt Gen (Dr) Rajesh Pant, National Information...
-
Oct 21, 20213 min read
242 views
0 comments


Defining Rules of Cyber Engagement (RoCyE)
Will the recent attack on Indian defence and government officials under operation Armour Piercer (click here to read details) amount to...
-
Oct 5, 20213 min read
96 views
0 comments


Why does India urgently need a new National Cyber Security Policy?
The nation have been hearing for the last two years that a new National Cyber Security Policy is ready and likely to be announced any...
-
Oct 2, 20212 min read
120 views
0 comments


Operation:Armor Piercer (Detected by CISCO's TALOS) attacked Indian Defence and Government Official
Operation:Armor Piercer (Detected by CISCO's TALOS
-
Sep 24, 20212 min read
534 views
1 comment