top of page


Securing the Mid-Market: Strategies for Overcoming Cybersecurity Challenges Amidst Evolving Threats and Limited Resources
Strategies for Overcoming Cybersecurity Challenges with research percentage Amidst Evolving Threats and Limited Resources advising key focus

Mohnish Singh
Nov 11, 20242 min read
Â
Â
Â


Insurance Sector Under Siege - cyber breaches in 2024
Recent data breaches involving
Insurance companies have raised significant concerns to IRDA and SEBI

Mohnish Singh
Nov 3, 20244 min read
Â
Â
Â


Understanding Log4j Vulnerability: Impacts, Exploits, and Mitigation Strategies
The blog describes risk of using Log4j that is a widely used Java-based logging utility that is part of the Apache Logging Services.

Mohnish Singh
Oct 31, 20244 min read
Â
Â
Â
Enhancing Cybersecurity Against Advanced Persistent Threats (APTs)
the evolving tactics and targets of APT groups, highlighting the ongoing threat they pose to organizations globally

Mohnish Singh
Oct 21, 20246 min read
Â
Â
Â


Guide to businesses for selecting Anti virus vendors
Choosing antivirus solution by referencing Anti-Malware Testing Standards Organization VB100 certification

Mohnish Singh
Oct 19, 20242 min read
Â
Â
Â


Securing Jenkins: Understanding Attack Vectors and Best Practices for Continuous Integration Environment
Jenkins is a prime target for cybercriminals With its extensive plugin ecosystem,introduce vulnerabilities, making it a landscape for attack

Mohnish Singh
Oct 16, 20242 min read
Â
Â
Â


Understanding Attack Paths and Stopping Lateral Movement
adversary-in-the-middle attacks that can bypass MFA

Mohnish Singh
Oct 14, 20242 min read
Â
Â
Â


The Impact of Cyber Attacks on Indian Firms
Indian firms have increasingly become targets of cyber attacks, leading to significant repercussions across various domains.

Mohnish Singh
Oct 12, 20243 min read
Â
Â
Â


Star Health Insurance Hack
CYBER THREATS TO INSURANCE

Mohnish Singh
Oct 11, 20242 min read
Â
Â
Â


Impact of Cyber attacks on Indian SMB's C-level
Impact of Cyber attacks on Indian SMB's C-level Summarizes the quantification of business loss on Smb's due to cyber incidents

Mohnish Singh
Oct 6, 20243 min read
Â
Â
Â


Cyber Attacks - Drive-by Download
malicious software is installed on a user's device without their consent or knowledge
Exploit kit
Malvertising

Mohnish Singh
Oct 5, 20244 min read
Â
Â
Â


A Comprehensive Framework for protecting websites
Comprehensive Framework for protecting websites
Cases - zivame
Injection attacks
Conclusion

Mohnish Singh
Oct 3, 20243 min read
Â
Â
Â


Understanding Denial-of-Service (DoS) Attacks
the post explian DOS attacks - Its strategies
Types
Current trends

Mohnish Singh
May 19, 20243 min read
Â
Â
Â


Cybersecurity Assessment for Local Businesses
Cybersecurity Assessment for Local Businesses delivered by team of experts that you can entrust in your security transformation journey

Mohnish Singh
May 18, 20242 min read
Â
Â
Â


Enabling businesses to deal with Ransomware Attack
How to deal with most pervasive and damaging cyber threat ransomware

Mohnish Singh
May 16, 20244 min read
Â
Â
Â
bottom of page