In 2012, Saudi Aramco, the prominent global energy company, encountered a severe and unprecedented cyber incident that sent shockwaves through the industry. The company fell…
SCADA Security Hacking Story: Duqu, Flame, and Gauss
In 2011, Hungarian cyber security researchers made a significant discovery of three information-stealing malware: Duqu, Flame, and Gauss. This malware was found to be related…
Phishing Story: ICICI
In 2017, a central Indian bank, ICICI Bank, faced a significant phishing attack that targeted its customers. The attack aimed to deceive customers into revealing…
Phishing Story: Google
In 2016, one of the world’s largest and most prominent technology companies, Google, fell victim to a sophisticated phishing attack. The attack targeted many users,…
Phishing Story: Flipkart
In 2020, a leading Indian e-commerce company, Flipkart, experienced a significant phishing attack that targeted its customers. The attack aimed to deceive users into revealing…
Process & Benefits of Compliance Audits
Compliance audits are systematic reviews conducted by organizations to assess whether their operations, processes, and activities adhere to applicable laws, regulations, policies, and industry standards….
Difference between VAPT and Red Teaming
In the realm of cybersecurity, there are numerous methodologies employed to assess and enhance the resilience of an organization’s digital infrastructure. Two commonly discussed practices…
Comparison of ISO27001 and Cyber Essentials
ISO 27001 and Cyber Essentials are popular frameworks for managing and improving organisation information security. While they share some similarities, they differ in scope, requirements,…
Benefits of Canada PIPEDA compliance
PIPEDA is the Personal Information Protection and Electronic Documents Act, Canada’s federal privacy law for private sector organisations. Compliance with PIPEDA brings several benefits to…
The Psychology behind disliking SOC2 Compliance
The American Institute of CPAs (AICPA) established SOC 2, Service Organisation Control 2, a widely accepted auditing standard. It focuses on the controls and processes…