CALL US
+91 840 8891 911
E-MAIL
contact@varutra.com

Zooming Security Vulnerabilities [Part – 2]

Securely Hosting Zoom Meetings This blog article will cover security best practices in setting up Zoom meetings securely! 1. Ensure ...
Read More

Zooming Security Vulnerabilities [Part – 1]

Diving into Zoom Security Vulnerabilities [Part – 1] Introduction - Zoom is a popular web-based video conferencing application available to ...
Read More

Organizations Hit by Maze Ransomware Attack !!

Introduction - Maze, also known as ChaCha, is a ransomware that had been first discovered in the month of May ...
Read More

Containerization and It’s Impact on Enterprise Security

What’s this “D” word everyone is talking about? Oh.. you mean Docker!! The latest buzz word everyone is talking about ...
Read More

Joanap and Brambul Malware

Joanap and Brambul Malware has come from North Korea that has infected numerous Microsoft Windows computers globally over the last ...
Read More

Zero Knowledge Proof

Introduction Looking for something exciting and a secure way to protect your secrets? Zero-Knowledge Protocol has the potential to increase ...
Read More

Formjacking – The New Favourite Cyber Crooks Hack

“We are in the most popular world of – Black hat hacker”  What is Formjacking Attack? The year's rampant threat ...
Read More

Best Practices – BYOD and Mobile Device Security

BYOD (Bring Your Own Device) BYOD (Bring Your Own Device) is a practice where employees can bring their own devices ...
Read More

Code Obfuscation

Abstract In this paper, we came up with a basic understanding of Code protection technologies which need anti-reverse engineering transformations ...
Read More

Vulnerabilities Related to SAML [Security Assertion Markup Language] – Part 1

In this blog, we are going to discuss about what is the SAML(Security Assertion Markup Language) and how it works ...
Read More

Security Advisory – Email Phishing

In today’s era, email is still used as one of the primary ways to communicate, which is not only restricted ...
Read More

Security Advisory – Typosquatting

There are multiple cases of redirect which are due to typing mistake (typos) from the users which leads to the ...
Read More

Best Practices to Harden Office 365

1. Password Policy It is always recommended to use a strong password policy to help secure the data and service ...
Read More

Security Advisory – Ransomware Attack Targeting China – December 2018

1. Ransomware through Supply Chain Attack: A new ransomware strain spreading as a result of supply chain attack targeting Chinese ...
Read More

Security Advisory – Tecnimont Cyber Theft

Background: Maire Tecnimont SpA is the parent company of the Italian group Maire Tecnimont, which consists of at least 50 ...
Read More

Security Advisory – Saipem Cyber Attack by Shamoon Malware

1. Introduction Saipem identified cyber-attack on Monday i.e. on 10th December 2018 that had primarily affected its servers in the ...
Read More