top of page

Understanding Attack Surface Exposures in Ransomware Attacks
The growing frequency of incidents highlights the urgent need for enhanced cybersecurity measures to protect against potential breaches
Mohnish Singh
Dec 22, 20242 min read
8 views
0 comments

Exploring the Evolution of Malware: Statistics and Real-life Examples of Malicious Software in the Wild
various techniques to infiltrate systems, steal data, or disrupt operations, highlighting the importance of robust cybersecurity measures.
Mohnish Singh
Nov 20, 20244 min read
1 view
0 comments

Securing the Mid-Market: Strategies for Overcoming Cybersecurity Challenges Amidst Evolving Threats and Limited Resources
Strategies for Overcoming Cybersecurity Challenges with research percentage Amidst Evolving Threats and Limited Resources advising key focus
Mohnish Singh
Nov 11, 20242 min read
1 view
0 comments

Insurance Sector Under Siege - cyber breaches in 2024
Recent data breaches involving
Insurance companies have raised significant concerns to IRDA and SEBI
Mohnish Singh
Nov 3, 20244 min read
8 views
0 comments

Understanding Log4j Vulnerability: Impacts, Exploits, and Mitigation Strategies
The blog describes risk of using Log4j that is a widely used Java-based logging utility that is part of the Apache Logging Services.
Mohnish Singh
Oct 31, 20244 min read
8 views
0 comments
Enhancing Cybersecurity Against Advanced Persistent Threats (APTs)
the evolving tactics and targets of APT groups, highlighting the ongoing threat they pose to organizations globally
Mohnish Singh
Oct 21, 20246 min read
1 view
0 comments

Not Every Cloud Has a Silver Lining: The Cybersecurity Challenges of Cloud Adoption
On 8 June 2018,the PeoplePages breach came in the public this served as an example of things can go wrong in the Cloud compromising security
Mohnish Singh
Oct 20, 20242 min read
6 views
0 comments

Guide to businesses for selecting Anti virus vendors
Choosing antivirus solution by referencing Anti-Malware Testing Standards Organization VB100 certification
Mohnish Singh
Oct 19, 20242 min read
2 views
0 comments


Securing Jenkins: Understanding Attack Vectors and Best Practices for Continuous Integration Environment
Jenkins is a prime target for cybercriminals With its extensive plugin ecosystem,introduce vulnerabilities, making it a landscape for attack
Mohnish Singh
Oct 16, 20242 min read
0 views
0 comments

Understanding Attack Paths and Stopping Lateral Movement
adversary-in-the-middle attacks that can bypass MFA
Mohnish Singh
Oct 14, 20242 min read
0 views
0 comments

The Impact of Cyber Attacks on Indian Firms
Indian firms have increasingly become targets of cyber attacks, leading to significant repercussions across various domains.
Mohnish Singh
Oct 12, 20243 min read
3 views
0 comments

Star Health Insurance Hack
CYBER THREATS TO INSURANCE
Mohnish Singh
Oct 11, 20242 min read
1 view
0 comments

Impact of Cyber attacks on Indian SMB's C-level
Impact of Cyber attacks on Indian SMB's C-level Summarizes the quantification of business loss on Smb's due to cyber incidents
Mohnish Singh
Oct 6, 20243 min read
0 views
0 comments

Cyber-Attack on AIIMS targeting india's critical infrastructure
developing robust healthcare systems in the digital era is a key challenge that healthcare organisations must prioritise.
Mohnish Singh
Oct 6, 20243 min read
0 views
0 comments

Cyber Attacks - Drive-by Download
malicious software is installed on a user's device without their consent or knowledge
Exploit kit
Malvertising
Mohnish Singh
Oct 5, 20244 min read
1 view
0 comments

A Comprehensive Framework for protecting websites
Comprehensive Framework for protecting websites
Cases - zivame
Injection attacks
Conclusion
Mohnish Singh
Oct 3, 20243 min read
7 views
0 comments

Weaponization of Net Support RAT: Tactics, Techniques, and Procedures
Threat hunting for Netsupport RAT
Mohnish Singh
Oct 2, 20242 min read
4 views
0 comments

Incident Readiness and Response: Safeguarding Your Organizations
Incident Readiness and Response for enterprises to face ever-evolving threat landscape, with cybercriminals constantly devising new attack
Mohnish Singh
May 26, 20242 min read
4 views
0 comments

Significant cybersecurity events of the past year.
The cyber landscape in 2023 was marked by a diverse array of threats and attacks, showcasing the evolving tactics and capabilities of malici
Mohnish Singh
May 24, 20243 min read
2 views
0 comments

Securing Organizations through password management
Effective password practices help protect organizations Defence robust and secure
Mohnish Singh
May 22, 20242 min read
1 view
0 comments
bottom of page