• Grab A Quote

    Grab A Quote


    Services Required
     Security Posture Assessment
     Penetration Testing
     Vulnerability Assessment
     Architecture Review
     Source Code Review
     Other Services Required

    Disclaimer: We require this information to understand your needs and provide you with a better service. Your privacy is important to us. We will not disclose your personal information to any third party.
  • Got Hacked? Get Instant Help 24/7

    Got hacked ? Let Us Help You




    Disclaimer: We require this information to understand your needs and provide you with a better service. Your privacy is important to us. We will not disclose your personal information to any third party.

Warlock

February 2018: The SWIFT HEISTS
February 2018: The SWIFT HEISTS

Hi folks, In the era of everything being cashless and relying more and more on e-payment, we came upon a disconcerting story, that may make you want to reconsider slipping your gold bars under the


 
February 2018: Fortune 500 Credentials Leaked in Massive Amount
February 2018: Fortune 500 Credentials Leaked in Massive Amount

Hi folks, Working in a Fortune 500 company is something that can make anyone proud. But, being part of the Fortune 500 employees' leaked credentials would make any of us worried. A study by credential


 
February 2018: Your Medical Scanners Might Be Vulnerable
February 2018: Your Medical Scanners Might Be Vulnerable

Hi folks,Nowadays, it is not uncommon to hear about MRI or CT scans when you go to a hospital, is it? That is how integrated technology is with the medical industry. However, many of these devices do


 
February 2018: Spritecoin: The Devious E-Wallet
February 2018: Spritecoin: The Devious E-Wallet

Hi folks, Getting a fake bank note is already frustrating, now imagine getting a fake digital currency. And then, imagine carrying a wallet that is spying on you. Spritecoin is a fake wallet


 
February 2018: Your Apps Need Patching due to Electron Vulnerability
February 2018: Your Apps Need Patching due to Electron Vulnerability

Hi folks, Do you use Skype, Visual Studio, Twitch, WordPress? Then this news might need your attention as these apps that use Electron Framework, of which (the framework) it is found to be vulnerable


 
February 2018: Mirai Okiru : The One That Rises
February 2018: Mirai Okiru : The One That Rises

Hi folks, Do you know what Okiru means? According to the definition list in romajidesu.com, the meaning of Okiru in Japanese is, to be kindled, to get up, or to wake up. And wake up it did. If Mirai


 
February 2018: The Apologetic Ransomware: I'm Sorry
February 2018: The Apologetic Ransomware: I'm Sorry

Hi folks, The word ransom itself sounds scary, and the ransomware names are usually in the same line. But, how do you feel when the ransomeware that attacks you, keeps saying"imsorry"? "I'm Sorry" is


 
January 2018: Data Privacy Day Special: Dangers of Oversharing
January 2018: Data Privacy Day Special: Dangers of Oversharing

Hi  folks Did you know that today is Data Privacy Day? As AKATI Consulting Group is a Data Privacy Day Champion endorsed by National Cyber Security Alliance, we fully support the campaign, realizing


 
January 2018: The Evading Horse - Ursnif Malware's Double Process Hollowing Technique
January 2018: The Evading Horse - Ursnif Malware's Double Process Hollowing Technique

Hi folks, Do you remember the story of the Trojan Horse, which inspired the trojan attacks? It seems a new variant of it is galloping away in the cyber pasture. Ursnif, an evolution of an old banking


 
January 2018: Attacking IPv4 via IPv6
January 2018: Attacking IPv4 via IPv6

Hi folks,What is IPv4? What is IPv6? Well, if you have Windows Vista and above, then you have IPv6 enabled in your system, and it can become someone's weapon.Many company networks are still using IPv4


 
January 2018: Malware Gifts for the Cybersecurity Winners
January 2018: Malware Gifts for the Cybersecurity Winners

Hi folks, Isn't it the strangest thing, when you win a cybersecurity quiz, and gifted with a malware-laden USB drive? But wait, maybe it's the stage 2 of the quiz... Taiwan's Criminal Investigation


 
January 2018: Travel Agencies Hacked and Customers Details Held For Ransom
January 2018: Travel Agencies Hacked and Customers Details Held For Ransom

Hi folks, Have you booked your holiday package yet? Don't forget to ask your travel agenccies if they  have secured their customer databases! Two travel agencies in Hong Kong, Goldjoy Holidays and Big


 
First Page |  1 2 3 4  | Last Page