• WELCOME TO

    VISTA InfoSec Blog

    Trusted Advisors, Assured Compliance.
  • DO YOU NEED
    BFSI Security Solutions
    Check out our options and features.
    Get Started Now!
  • DO YOU NEED A NEW
    Government Security Solutions
    Check out our options and features.
    Get Started Now!
  • DO YOU NEED A NEW
    Healthcare Security Solutions
    Check out our options and features.
    Get Started Now!
  • DO YOU NEED A NEW
    Retail Security Solutions
    Check out our options and features.
    Get Started Now!
  • DO YOU NEED A NEW
    Energy & Utilities Security Solutions
    Check out our options and features.
    Get Started Now!
December 10, 2018 - Sebi for tightening cyber security  |  December 11, 2018 - What workers need to learn about cyber security  |  December 12, 2018 - Cybersecurity, trade tensions rank as top threats to markets in 2019, survey finds  |  December 13, 2018 - Three cybersecurity tips to help train your employees Advice, Technology Dec  |  December 14, 2018 - Predicting cyberattacks: the need for new cyber security tools  |  December 15, 2018 - Sebi eases norms around cyber security ops for small market intermediaries  |  January 24, 2019 - Webinar - Designing your Cyber Security framework using NIST guidelines Timing: 4.30 to 5.10 IST & BST :2.00 to 2.40 EST  |  February 28, 2019 - Webinar - New Kid on the block - SOC for Cybersecurity  |  February 26, 2019 - Most IoT devices are being compromised by exploiting rudimentary vulnerabilities  |  March 14, 2019 - Times Internet's lifestyle websites are offline in Europe due to GDPR non-compliance  |  March 13, 2019 - 76% Indian businesses hit by cyberattacks: Sophos’ EDR survey  |  March 14, 2019 - The 3 Most Common Social Engineering Cyber Attacks  |  March 11, 2019 - PayPal, Square vulnerabilities impact mobile point-of-sale machines  |  February 27, 2019 - Retailers have become the top target for credential stuffing attacks  |  March 09, 2019 - Israeli cyberattack firm woos investors amid a human rights firestorm  |  March 01, 2019 - 40% of malicious URLs were found on good domains  |  March 06, 2019 - Nearly 70 percent of organizations have understaffed Cybersecurity teams: ISACA  |  March 06, 2019 - Huawei a threat, deeply tied to Chinese intel:US  |  February 22, 2019 - Russian hackers can breach an entire computer network in 18 minutes  |  March 02, 2019 - RBI slaps fine on four banks  |  April 01, 2019 - Sacked IT guy annihilates 23 of his ex-employer’s AWS servers  |  March 20, 2019 - Google hit with €1.5bn fine from EU over advertising  |  March 18, 2019 - Hackers Bypass Multi-factor Authentication to Hack Office 365 & G Suite Cloud Accounts Using IMAP Protocol  |  March 23, 2019 - Ransomware Forces Two Chemical Companies to Order ‘Hundreds of New Computers’  |  April 08, 2019 - Data breach legislation proposes jail time for CIO, HR execs  |  May 09, 2019 - What is phishing?  |  May 09, 2019 - Free IT Security Tools  |  April 18, 2019 - Email – From Novelty to Nefarious  |  April 18, 2019 - Better protection against Man in the Middle phishing attacks  |  April 21, 2019 - When Your Sandbox Fails  |  April 16, 2019 - Bad security hygiene still a major risk for enterprise IT networks  |  April 16, 2019 - Is your DDos Mitigation Strategy Terabit-Proof?  |  April 07, 2019 - Chinese Hackers Used NSA Tool a Year Before Shadow Brokers Leak (SecurityWeek)  |  April 17, 2019 - Cyberspies Hijacked the Internet Domains of Entire Countries  | 

News


CYBER SECURITY & CYBER RESILIENCE FRAMEWORK FOR STOCK BROKERS / DEPOSITORY PARTICIPANTS

Share Button

Central Depository Services (India) Limited has come out with new norms to scale up the Cyber Security & Cyber Resilience Framework for Stock Brokers/ Depository Participants are advised to take note of the same and ensure compliance. According to the circular, the Rapid growth of Technology have enforced, all enterprises to have robust cyber security and […]

NESA COMPLIANCE – For the Integrity of Information

Share Button

The National Electronic Security Authority (NESA) is the United Arab Emirates (UAE) federal authority responsible for the advancement of the nation’s cyber security. NESA has produced a set of standards and guidelines for government entities in critical sectors in order to protect the UAE’s critical data/information infrastructure. This aligns UAE organizations and government with a […]

RBI Cyber Security Framework for UCBs

Share Button

Two months after malware attack on Cosmos Bank, on Oct 19, 2018, the RBI came out with new norms to scale up the cyber-security and resilience framework at the urban cooperative banks (UCBs). According to the circular, all 1500 UCBs should immediately put in place a Cyber Security policy, duly approved by their Board/Administrator, giving a framework and […]

Setting up ELK Stack on Ubuntu 16.04

Share Button

    ELK stands for Elasticsearch, Logstash and Kibana and its a robust open source solution for searching, analyzing and visualizing data. Elasticsearch is a distributed, RESTful search and analytics engine based on Lucene, Logstash is a data processing pipeline for managing events and logs and Kibana is a web application for visualizing data in […]

GDPR & Application Compliance

Share Button

Is your application be it desktop or mobile GDPR ready? The question seems rhetorical especially since the act seems to be geared towards protecting the privacy of data subjects in any of the EU member states. On the face of it, the Act does appear to be more process oriented and towards making safeguarding the […]

6 Decryptors to Recover Your Data Affected by Ransomware

Share Button

2017 was the year of ransomware. Global ransomware cost has increased 15 times in a period of two years. In 2017, in just 4 days, $1 billion in damages were caused by the WannaCry outbreak. Global ransomware costs are expected to cross the mark of $5 billion this year. While a huge number of ransomwares […]

Everything You Need to Know About Ransomware

Share Button

Ransomware: Ransom + Malware. Ransomware is a kind of malware in which the data files on a victim’s computer is encrypted, and payment is demanded before the ransomed data is decrypted and access is returned to the victim. Ransomware are of 5 types: I. Encrypting ransomware Similar to WannaCry & Petya, this kind of ransomware […]

Fileless Malware: Your Halloween Nightmare

Share Button

Whenever you buy a new laptop or desktop, you always make sure to drag one antivirus product off the shelf and drop it in your cart. It is a well-known prescription to avoid malwares or viruses. No- one has to be a cyber-security expert to crack that! Every traditional antivirus program depends on the presence […]

WPA2 “KRACK”ed: Your wireless may have been compromised

Share Button

Introduction Since 2004, almost all of the Wi-Fi networks in our homes and companies have been stopping the hackers from reading, stealing, or manipulating the data. This was all achieved by the current industry standard, known as WPA2 (Wi-Fi Protected Access 2), which encrypts the data traffic. This WPA2, as it turns out, can be […]

GDPR & Personal Data: Everything you need to know.

Share Button

In this new electronic age, the key to freedom is privacy. Internet, in the name of connecting with different people, has struck hard on privacy. Personal data of several million users stored electronically is a very valuable asset which is later used by the companies to create complicated algorithms which, in the end, help them […]