Government Consultants, expectationsChanakya’s Arthashashtra, gives a lot of importance for Kings to have trusted and knowledgeable people surrounding them to get expert…Sep 41Sep 41
New Impactful TRAI GuidelinesOn 20th August, TRAI has released a new guideline directing telecom service providers to plug loopholes exploited by cybercriminals. Some…Aug 20Aug 20
Exploiting iMessage — Transnational CybercrimeA campaign exploiting iMessage’s visibility vulnerability was launched recently, targeting iPhone users across India. Some of the…Jul 9Jul 9
How to recover hacked social media accounts?Off-late, there has been a steep rise in number of hacking incidents for WhatsApp, Facebook and Instagram. Indian Government has created…Mar 103Mar 103
Advanced APK Investigation | Android MalwareCyber criminals have started moving towards android malwares to steal OTPs, user information etc. When a victim reports such APK, it needs…Oct 10, 2023Oct 10, 2023
Always Leave Office on Time — APJ Abdul Kalam || An investigation on the QuoteLast week I had an intellectual discussion with my friend who said, Shri Abdul Kalam has said, Leave your office on time. A simple…Aug 31, 2023Aug 31, 2023
New Age Transaction Monitoring Signals for Banks || Rented AccountsDigital Transactions in India is seeing a phenomenal growth. As per latest data from NPCI about UPI Transaction, total value of UPI based…Aug 17, 2023Aug 17, 2023
No Logs Investigation / Incident Response — IPDR to rescueFundamental principle any quality hacking attempt is to not leave any traces in the environment. For such situations, IR or root cause…Jun 4, 20231Jun 4, 20231
Institutionalising an Organisation || From person dependent to process drivenOrganizations should be institution driven rather person dependent.May 1, 2023May 1, 2023