top of page


Understanding Attack Surface Exposures in Ransomware Attacks
The growing frequency of incidents highlights the urgent need for enhanced cybersecurity measures to protect against potential breaches

Mohnish Singh
Dec 22, 20242 min read
Â
Â
Â


Exploring the Evolution of Malware: Statistics and Real-life Examples of Malicious Software in the Wild
various techniques to infiltrate systems, steal data, or disrupt operations, highlighting the importance of robust cybersecurity measures.

Mohnish Singh
Nov 20, 20244 min read
Â
Â
Â


Securing the Mid-Market: Strategies for Overcoming Cybersecurity Challenges Amidst Evolving Threats and Limited Resources
Strategies for Overcoming Cybersecurity Challenges with research percentage Amidst Evolving Threats and Limited Resources advising key focus

Mohnish Singh
Nov 11, 20242 min read
Â
Â
Â


Insurance Sector Under Siege - cyber breaches in 2024
Recent data breaches involving
Insurance companies have raised significant concerns to IRDA and SEBI

Mohnish Singh
Nov 3, 20244 min read
Â
Â
Â


Understanding Log4j Vulnerability: Impacts, Exploits, and Mitigation Strategies
The blog describes risk of using Log4j that is a widely used Java-based logging utility that is part of the Apache Logging Services.

Mohnish Singh
Oct 31, 20244 min read
Â
Â
Â
Enhancing Cybersecurity Against Advanced Persistent Threats (APTs)
the evolving tactics and targets of APT groups, highlighting the ongoing threat they pose to organizations globally

Mohnish Singh
Oct 21, 20246 min read
Â
Â
Â


Not Every Cloud Has a Silver Lining: The Cybersecurity Challenges of Cloud Adoption
On 8 June 2018,the PeoplePages breach came in the public this served as an example of things can go wrong in the Cloud compromising security

Mohnish Singh
Oct 20, 20242 min read
Â
Â
Â


Guide to businesses for selecting Anti virus vendors
Choosing antivirus solution by referencing Anti-Malware Testing Standards Organization VB100 certification

Mohnish Singh
Oct 19, 20242 min read
Â
Â
Â


Securing Jenkins: Understanding Attack Vectors and Best Practices for Continuous Integration Environment
Jenkins is a prime target for cybercriminals With its extensive plugin ecosystem,introduce vulnerabilities, making it a landscape for attack

Mohnish Singh
Oct 16, 20242 min read
Â
Â
Â


Understanding Attack Paths and Stopping Lateral Movement
adversary-in-the-middle attacks that can bypass MFA

Mohnish Singh
Oct 14, 20242 min read
Â
Â
Â


The Impact of Cyber Attacks on Indian Firms
Indian firms have increasingly become targets of cyber attacks, leading to significant repercussions across various domains.

Mohnish Singh
Oct 12, 20243 min read
Â
Â
Â


Star Health Insurance Hack
CYBER THREATS TO INSURANCE

Mohnish Singh
Oct 11, 20242 min read
Â
Â
Â


Impact of Cyber attacks on Indian SMB's C-level
Impact of Cyber attacks on Indian SMB's C-level Summarizes the quantification of business loss on Smb's due to cyber incidents

Mohnish Singh
Oct 6, 20243 min read
Â
Â
Â


Cyber-Attack on AIIMS targeting india's critical infrastructure
developing robust healthcare systems in the digital era is a key challenge that healthcare organisations must prioritise.

Mohnish Singh
Oct 6, 20243 min read
Â
Â
Â


Cyber Attacks - Drive-by Download
malicious software is installed on a user's device without their consent or knowledge
Exploit kit
Malvertising

Mohnish Singh
Oct 5, 20244 min read
Â
Â
Â


A Comprehensive Framework for protecting websites
Comprehensive Framework for protecting websites
Cases - zivame
Injection attacks
Conclusion

Mohnish Singh
Oct 3, 20243 min read
Â
Â
Â


Weaponization of Net Support RAT: Tactics, Techniques, and Procedures
Threat hunting for Netsupport RAT

Mohnish Singh
Oct 2, 20242 min read
Â
Â
Â


Incident Readiness and Response: Safeguarding Your Organizations
Incident Readiness and Response for enterprises to face ever-evolving threat landscape, with cybercriminals constantly devising new attack

Mohnish Singh
May 26, 20242 min read
Â
Â
Â


Significant cybersecurity events of the past year.
The cyber landscape in 2023 was marked by a diverse array of threats and attacks, showcasing the evolving tactics and capabilities of malici

Mohnish Singh
May 24, 20243 min read
Â
Â
Â


Securing Organizations through password management
Effective password practices help protect organizations Defence robust and secure

Mohnish Singh
May 22, 20242 min read
Â
Â
Â
bottom of page