Increasing social engineering attacks - Smishing, vishing, and phishing | VARINDIA News Hour

181 views

Increasing social engineering attacks - Smishing, vishing, and phishing | VARINDIA News Hour

We live in a world that’s becoming more digitally dependent. Right from our social interactions to professional interchanges and financial transactions, most take place digitally. Smishing and vishing are two types of fraud that use SMS (smishing) and voice (vishing) to trick people into giving up money or personal information. They’re “social engineering attacks,” meaning that in a smishing or vishing attack, the attacker uses impersonation to exploit the target’s trust. Because 96% of phishing attacks arrive via email, the term “phishing” is sometimes used to refer exclusively to email-based attacks. A recent survey revealed some alarming numbers about Indian companies managing personal identifiable data and electronic health records. While digital resources are enabling, they also leave us vulnerable to cyber criminals as a lot of information regarding our personal and professional lives rests in the digital domain. Cyber insurance or cyber security insurance provides coverage from activities such as identity theft, unauthorized transactions, and more. Buying a cyber insurance policy can safeguard against online frauds. The policy can be bought by anyone who is 18 years and above and can be bought for family members. Nearly 58% of Indian companies have not opted for cyber insurance yet, indicating lack of awareness about cyber-attacks and cyber risk management strategies. The survey by RIMS and JB Boda Group says, as more attacks on utilities and industrial systems emerge, with Ransomware involved, it no longer is an IT related issue, but of the CFO and board.

The COVID-19 pandemic has triggered digital transformation across companies, leading to the creation of a complex IT landscape in the form of public clouds, unfamiliar home networks, external systems connected through APIs, along with a plethora of access points into their sphere of monitoring and .

You may also like

  • Watch Increasing social engineering attacks - Smishing, vishing, and phishing | VARINDIA News Hour Video
    Increasing social engineering attacks - Smishing, vishing, and phishing | VARINDIA News Hour

    Increasing social engineering attacks - Smishing, vishing, and phishing | VARINDIA News Hour

    We live in a world that’s becoming more digitally dependent. Right from our social interactions to professional interchanges and financial transactions, most take place digitally. Smishing and vishing are two types of fraud that use SMS (smishing) and voice (vishing) to trick people into giving up money or personal information. They’re “social engineering attacks,” meaning that in a smishing or vishing attack, the attacker uses impersonation to exploit the target’s trust. Because 96% of phishing attacks arrive via email, the term “phishing” is sometimes used to refer exclusively to email-based attacks. A recent survey revealed some alarming numbers about Indian companies managing personal identifiable data and electronic health records. While digital resources are enabling, they also leave us vulnerable to cyber criminals as a lot of information regarding our personal and professional lives rests in the digital domain. Cyber insurance or cyber security insurance provides coverage from activities such as identity theft, unauthorized transactions, and more. Buying a cyber insurance policy can safeguard against online frauds. The policy can be bought by anyone who is 18 years and above and can be bought for family members. Nearly 58% of Indian companies have not opted for cyber insurance yet, indicating lack of awareness about cyber-attacks and cyber risk management strategies. The survey by RIMS and JB Boda Group says, as more attacks on utilities and industrial systems emerge, with Ransomware involved, it no longer is an IT related issue, but of the CFO and board.

    The COVID-19 pandemic has triggered digital transformation across companies, leading to the creation of a complex IT landscape in the form of public clouds, unfamiliar home networks, external systems connected through APIs, along with a plethora of access points into their sphere of monitoring and

    Technology video | 181 views

  • Watch Increasing Concerns On Cloud Services Are Under Attack | Cyber Attack | VARINDIA News Hour Video
    Increasing Concerns On Cloud Services Are Under Attack | Cyber Attack | VARINDIA News Hour

    Increasing Concerns On Cloud Services Are Under Attack | Cyber Attack | VARINDIA News Hour

    With the new hybrid-working model we see organizations increasingly moving more of their workload settings to the cloud. While this transformation offers great agility and scalability benefits, it comes with inherent and increased risks to security and compliance. A simple configuration error can result in your entire organization being exposed to threat actors who no longer need to break into your data center to access your critical data or conduct ransomware attacks. As per Gartner by 2025, 99% of cloud security issues will be a result of human error when configuring assets and security in the cloud. At a time when organizations are becoming increasingly dependent on third-party cloud vendors such as AWS, Microsoft Azure, IBM and Google Cloud Platform to securely manage their data, concerns around misconfigurations and other vulnerabilities in the cloud are likely to amplify quickly. What’s more, many of the organizations finding themselves at risk have had to accelerate their digital transformation initiatives at an uncomfortable pace over the past two years, resulting in knowledge and talent gaps that only add to their fears around cloud security.

    Under the shared responsibility model - a security framework designed to ensure accountability for compromised data and other incidents - the cloud provider will offer basic cloud security, but it's up to businesses themselves to secure their own data within the cloud. To put it in another way, if cloud providers ensure the town gates are locked and the perimeter is well guarded, it’s still up to businesses to ensure their own doors are locked. That’s no mean feat, particularly when you consider that many large enterprises now rely on three or four cloud platforms as part of a multi-cloud strategy. Attacks on cloud service providers are ramping up. As outlined in Check Point 2022 Security Report, the previo

    Technology video | 115 views

  • Watch Safety of CBDC from vulnerability and cyber attacks | CBDC explained | VARINDIA News Hour Video
    Safety of CBDC from vulnerability and cyber attacks | CBDC explained | VARINDIA News Hour

    Safety of CBDC from vulnerability and cyber attacks | VARINDIA explained | VARINDIA News Hour

    #CBDC is a digital form of central bank money that can be accessible to the general public; essentially, it consists of individuals and firms having access to transaction and savings accounts with their home country’s central bank. The Government of India has proposed to issue CBDC, ‘Digital Rupee’ during the FY2022-23 which would be a digital avatar of India’s Fiat Currency, controlled and monitored by the Reserve Bank of India (RBI). CBDC will be a legal tender, being a revamped version of the physical currency, which will eventually reduce cost of currency management. CBDC could help policy-makers achieve goals around payment efficiency, financial inclusion, banking and payment competitiveness, access to safe central bank money in the era of digital payments, and more. People can convert digital currency to physical currency and vice-versa with ease. As per RBI, the digital rupee blockchain being developed by the RBI would be able to trace all transactions, unlike the current system of mobile wallets offered by private companies. The units issued in the digital rupee would be included in the currency in circulation, it added. The RBI's digital currency is likely to debut by early 2023. Currently, the bitcoin blockchain supports up to seven transactions per second and then there are some others that let a few thousand transactions per second. However, security aspects involved in constructing and deploying a central bank digital currency (CBDC).

    It is a matter of great concern on the Security part, which is an essential element in the CBDC system. In addition to securing the underlying storage and transfer of value, security involves

    aspects of privacy and resilience. Threats must be mitigated to protect the integrity of funds and the confidentiality of users. A secure CBDC system will retain public trust in the central bank. Under an ac

    Technology video | 128 views

  • Watch The Growing Trickbot Attacks | Trickbot Malware | Posing Concerns | VARINDIA News Hour Video
    The Growing Trickbot Attacks | Trickbot Malware | Posing Concerns | VARINDIA News Hour

    The Growing Trickbot Attacks | Trickbot Malware | Posing Concerns | VARINDIA News Hour

    TrickBot attack, the Windows services and the activities of Windows Defender or other antivirus software are first terminated. Various methods are then used to extend privileges. The cybercrime operators behind the infamous TrickBot malware have as soon as once more upped the ante by fine-tuning its strategies by including a number of layers of protection to slide previous anti-malware merchandise. The resulting administrative rights can then be used by further plug-ins, which the malware loads automatically. Subsequently, TrickBot spies on both the system and the networks and collects data from the user. The information gathered by the malware is then forwarded to external devices, or to the cybercriminals behind the attack. As per Kaspersky, initially, TrickBot often found its way into the system through phishing emails. This involves sending deceptively genuine fake emails from well-known institutions and companies, which often have an attachment. Victims of a TrickBot attack are requested in the email to open the attachment or link, which leads to the infection of the device. Opening the attachments causes the malware to be downloaded. A TrickBot infection can also occur, through malicious updates or through malware that is already on the end device. Once the malware has made it onto the computer and is able to save the user's data, one of its main goals is to remain undetected for as long as possible.

    A Research on Trickbot says, the malware targeting companies in retail, building materials, manufacturing, insurance, and construction with phishing emails are designed to steal credentials. The Trickbot malware is designed to build a botnet—a network of hundreds or sometimes thousands of hacked and connected devices used to launch attacks on organizations and individuals. Russian-based criminals behind the notorious malware known as Trickbot appear to b

    Technology video | 105 views

  • Watch Criminals escalating SIM swap attacks to steal millions of dollars: FBI | VARINDIA News Hour Video
    Criminals escalating SIM swap attacks to steal millions of dollars: FBI | VARINDIA News Hour

    Criminals escalating SIM swap attacks to steal millions of dollars: FBI | VARINDIA News Hour

    #VARINDIA_News_Hour #VARINDIA #Breaking_News

    #Ransomware continues to be an ongoing problem with protecting users’ data, there is a cell phone scam the public needs to be aware of as well. The FBI says criminals have escalated SIM card swap attacks to hijack victims’ phone numbers and steal millions of dollars from fiat and virtual currency accounts. “Both people and companies have become conditioned to being able to verify identity through simple questions like social security number or mother’s maiden name. Unfortunately, this falls apart completely when data breaches affecting millions of people routinely occur. Now information that was previously assumed to be relatively private is in the hands of malicious parties who can leverage it to easily impersonate their victims.” SIM swapping is a scam in which malicious parties target cell phone carriers to gain access to victims’ bank accounts, virtual currency accounts and additional sensitive information by using social engineering, insider threat or phishing techniques. Social engineering involves a criminal to impersonate the victim’s mobile number by tricking the cell phone carrier into switching the victim’s mobile number to a SIM card that is in the criminal’s possession, allowing the malicious party to access the victim’s calls, texts and other data, but this is only one of the three methods used to steal funds from victims.

    FBI encourages mobile users to first contact their mobile carriers immediately to regain control of their phone number, then accessing their online accounts to change their passwords that protect their sensitive data. Insider threat takes place when a criminal actor pays off a mobile carrier employee to switch the victim’s SIM to a card currently in the criminal’s possession. Malicious parties can also employ phishing techniques to access victims’ sensitive data, and ste

    Technology video | 167 views

  • Watch Your Gmail account may not stop the attacks the way you think | Hacked | VARINDIA News Hour Video
    Your Gmail account may not stop the attacks the way you think | Hacked | VARINDIA News Hour

    Your Gmail account may not stop the attacks the way you think | Hacked | VARINDIA News Hour

    There are millions of enterprises that have been integrated into the Google ecosystem with Android, Gmail, Search, Docs, Maps, YouTube, and many more products that the search giant has to offer. Google's G Suite brings much-needed convenience and organization to the enterprise cloud. But, can a Google Drive account be hacked? All of these things are controlled using one Gmail account. Due to such high-level integration, it becomes mandatory to keep your Gmail account secure and protected, because if it is compromised, then your whole Google ecosystem will be at risk. A report says, about 92% of startups are using Gmail; 60% of mid-sized businesses use it as well. More than 5 million businesses use Gmail. So far, Gmail has established itself as the popular email service for businesses of all sizes. Now the cyber attackers are not only targeting email, but the entire Google Workspace, including popular apps like Docs and Slides. Without full-suite security, your Google Workspace is at risk. When Avanan, acquired by Check Point Software, published an attack brief about the Google Docs comment exploit. The attack occurs when a threat actor adds a comment to a Google Doc (or any part of the Google Workspace). The target is mentioned with an @ sign. By doing so, an email is automatically sent to that person’s inbox. In that email, which comes from Google, the full comment, including the bad links and text, is included. Further, the email address isn’t shown, just the attackers’ name, making this ripe for impersonators.

    The researchers say, Google is about the middle of the road when it comes to preventing phishing emails from reaching the inbox: But the question is, can a ransomware use the entire G-Suite as a weapon, and how to stop the attacks that Gmail and others miss. Although Google scans for known malware uploaded to Drive, it has no way to identify Ze

    Technology video | 119 views

  • Watch Lessons to learn from Coinbase phishing attacks Video
    Lessons to learn from Coinbase phishing attacks

    #Oracle #Coinbase #cryptocurrency

    Coinbase phishing attacks


    Coinbase, is a platform used for buying, selling, and storing #cryptocurrency. The company had announced that a threat actor stole cryptocurrency from 6,000 customers after using a vulnerability to bypass the company's SMS multi-factor authentication security feature. Coinbase is the world's second-largest cryptocurrency exchange, with approximately 68 million users from over 100 countries. It explains that between March and May 20th, 2021, a threat actor conducted a hacking campaign to breach Coinbase customer accounts and steal cryptocurrency. Coinbase says the attackers needed to know the customer's email address, password, and phone number associated with their Coinbase account and have access to the victim's email account. While it is unknown how the threat actors gained access to this information, Coinbase believes it was through phishing campaigns targeting Coinbase customers to steal account credentials, which have become common. Additionally, banking trojans traditionally used to steal online bank accounts are also known to steal Coinbase accounts.



    Third parties first gained access to the email address, password, and phone number of the affected Coinbase customer in order to access to enter their accounts. The company said it wasn't sure how third parties got this access, and that it could have happened either through a phishing attack or another social-engineering technique. Coinbase says that it updated its SMS Account Recovery protocols as soon as it became aware of the problem. The company is encouraging customers to secure their accounts with a TOTP (time-based one-time password) or a hardware security key. And, of course, recommends changing your current password.

    · Be on guard for phishing attacks and use a way to automatically block a phishing attempt.

    · People should consider alternatives to SMS authen

    Technology video | 87 views

  • Watch Phishing attacks threatening industries Video
    Phishing attacks threatening industries

    Anyone who uses the internet or phones can be a target for phishing scammers. In the last year, cyber criminals delivered a wave of cyberattacks that were not just highly coordinated, but far more advanced than ever before seen. #Cybersecurity incidents are not only growing more prevalent but are also becoming more costly.

    Simple endpoint attacks became complex, multi-stage operations. Ransomware attacks hit small businesses and huge corporations alike. Crypto-mining attacks gave cyber criminals an easy foothold into company networks.

    Across the web, phishing attacks have baited unsuspecting victims into handing over bank info, social security numbers, and more. Plus, cybercriminals have become even savvier with their disguises. Sometimes these scams hide behind voices you know and trust, like your co-workers, your bank, or even your government. If you so much as click a link, you could be the scammer’s next victim.

    The most common scenario is:

    · You open your email and suddenly an alert from your bank appears in your inbox. When you click the link in the email, you are taken to a webpage that looks, more or less, like your bank.

    · Here’s the catch: this site is actually designed to steal your information. The alert will say there is a problem with your account and ask you to confirm your login and password.

    · After entering your credentials on the page that appears, you are usually sent to the actual institution to enter your information a second time. By steering you to the legitimate institution, you don't immediately realize your information was stolen.

    LinkedIn is a tempting target to spoof because the networking site often sends out emails with updates about your profile, your job search results and other topics. Since LinkedIn users are comfortable receiving emails, cybercriminals can more easily send out messages with links to phishing sites.

    #Microsoft was the second most spoofed b

    Technology video | 97 views

  • Watch New tricks to deliver phishing attacks Video
    New tricks to deliver phishing attacks

    Cyber criminals are trying new methods to help ensure phishing attacks are successful. The phishing emails infect victims with malware -- and they're doing so by experimenting with a new method of delivering the malicious payload. India has become one of the most frequently targeted countries for ransomware attacks this year.


    As per the report from Proofpoint, there's been a rise in cyber attackers attempting to deliver malware using OneNote documents, a digital notebook signified by .oneextensions that is part of the Microsoft 365 office applications suite.


    The question is why is phishing so favourite among black hats?


    Because it plays as what has been often described as cybersecurity’s “weakest link”. The 2022 DBIR revealed, 82% of breaches involved the human element, and that largely means employees being duped into clicking on malicious links and diving into fraudulent sites.


    That's why it’s important that all companies know how to spot some of the most common phishing scams if they are to protect their corporate information. It’s also crucial that their employees are familiar with some of the most common types of techniques that malicious actors use to pull off these scams.


    After all, they are the ones on the front line. However, it’s unfair to put all the blame on humans as weak security measures account for much of the exploits that slip through. A person can’t click on what’s not there, so email security platforms, digital risk protection, and anti-phishing solutions are a key element. However, you can’t defend against what you don’t understand.


    Researchers warn that it's likely these campaigns have a high rate of success if the emails aren't blocked -- and that more cyber-threat groups are likely to adopt this technique to successfully deliver phishing and malware campaigns.

    Today's Headline in NewsHours
    0:00 Intro
    2:2

    Technology video | 123 views

  • Watch Blockchain and AI to be mainstay in Realty, disrupt market | Bitcoin | VARINDIA News Hour Video
    Blockchain and AI to be mainstay in Realty, disrupt market | Bitcoin | VARINDIA News Hour

    Blockchain and AI to be mainstay in Realty, disrupt market | Bitcoin | VARINDIA News Hour

    One of the biggest challenges of IT teams is the difficulty to interpret and respond to incidents quickly. The challenges include how, or which team or analyst should respond, understanding the relationship between incidents, ensuring consistency in response, and gaining feedback to improve the security posture for the future. AI, with its incredible ability, can resolve every challenge in incident response through a more predictable and effective approach. AI can contain the attack spread through faster and accurate detection, retrieve affected assets, and improve security posture. Automated remediation is another feature that uses ML for incident response. AI solutions also use application programming interfaces to automate response and remediation through playbooks. A report by Grant Thornton Bharat says, Technologies such as blockchain and artificial intelligence are becoming boardroom discussion topics as the next few years are going to see a lot of digital-led transformations. The research points out that the pandemic and the growing tech space has accelerated the adoption of new and emerging technologies such as augmented reality, virtual reality, chatbots, big data, marketing automation, IoT, among others. Real estate companies are increasingly using new-age digital technologies in every aspect of searching, buying, selling, and home financing.

    According to experts, customer queries right from selecting the right property to after sales queries and arranging virtual visits have been completely redefined. 'With Blockchain in the real estate lifecycle, we can cut the middlemen from the transaction process, reducing the overall fee. Ever since listings became available online, home buyers have been able to search for homes by selecting attributes like location, price, square footage, number of bedrooms, and images of the property, but still don’t fin

    Technology video | 177 views

Vlogs Video

Cooking Video

  • Watch Cocktails INDIA is going live! Video
    Cocktails INDIA is going live!

    Join Our Bartending School The Spirit Vidyalaya, Call us on 7558204535

    Check out our website - www.cocktailsindia.com

    Check out my Podcast - 'Dada Bartender Podcast' https://open.spotify.com/show/0ub0ll4SUUWwHDo5qk5Nb5?si=7b3ac81e1c194caf

    Please follow me on Instagram: https://www.instagram.com/cocktailsindia2016/

    Instagram (2): www.instagram.com/dada.bartender

    Please follow me on Facebook: https://www.facebook.com/profile.php?id=100092566239501&mibextid=LQQJ4d

    For Business / Suggestion: dada@cocktailsindia.com
    sponsor.cocktailsindia@gmail.com

    Affiliate Link
    ********************************************************************
    My Camera - Canon EOS 200D II - Link To Purchase - https://amzn.to/3ZXuNQD
    My Best Camera - Sony A7 3 - https://amzn.to/3ZjAkAJ
    My Sound - GODOX MoveLink M2 - https://amzn.to/3JcqaMJ
    My Light setup - GODOX LC500R RGB LED Light Stick - https://amzn.to/3SQmu6P
    My Lens Setup - Sigma 18-35mm f/1.8 DC for Canon - https://amzn.to/3ZDqbyD
    My Lens Setup - Canon EF50MM F/1.8 STM Lens - https://amzn.to/41CEeX4
    My Audio Setup - Zoom H1n Handy Recorder - https://amzn.to/3mudhFa

    Home Bar Accessories - https://amzn.to/3LedEOv
    Glassware - https://amzn.to/3KRPSrf
    Ice mould - https://amzn.to/3EWlecr

    Disclaimer:
    The purpose of this channel is not to support or encourage underage drinking but to provide knowledge of the products we consume. This channel does not promote or sell any alcoholic product. The purpose of this channel is to strictly entertain and inform people about products available on the market. We are strictly against underage drinking and do not support it.

    About The Channel:-
    If you love homestyle cocktails, reviews of Alcohol, Drink knowledge, Bartending and many more then this channel is for you. India is the biggest alcohol consumer in the world. We buy and consume more whiskey in the worl

    Cooking video | 7758 views

  • Watch What My Students Speaking? About My Bartending School “The Spirit Vidyalaya” Kolkata Video
    What My Students Speaking? About My Bartending School “The Spirit Vidyalaya” Kolkata

    Kolkata’s Best Bartending School with LAB Felicity “The Spirit Vidyalaya”. If you love bartending then come and join us
    Please call Sourav +91 755-8204535 for further dissertation. Thanks

    What My Students Speaking? About My Bartending School “The Spirit Vidyalaya” Kolkata

    Cooking video | 871 views

  • Watch PEG क्या है, इसे PEG क्यों कहा जाता है? | What Is Peg? | #shorts Video
    PEG क्या है, इसे PEG क्यों कहा जाता है? | What Is Peg? | #shorts

    PEG क्या है, इसे PEG क्यों कहा जाता है? | What Is Peg

    Join Our Bartending School The Spirit Vidyalaya, Call us on 7558204535

    Check out our website - www.cocktailsindia.com

    Check out my Podcast - 'Dada Bartender Podcast' https://open.spotify.com/show/0ub0ll4SUUWwHDo5qk5Nb5?si=7b3ac81e1c194caf

    Please follow me on Instagram: https://www.instagram.com/cocktailsindia2016/

    Instagram (2): www.instagram.com/dada.bartender

    Please follow me on Facebook: https://www.facebook.com/profile.php?id=100092566239501&mibextid=LQQJ4d

    For Business / Suggestion: dada@cocktailsindia.com
    sponsor.cocktailsindia@gmail.com

    Affiliate Link
    ********************************************************************
    My Camera - Canon EOS 200D II - Link To Purchase - https://amzn.to/3ZXuNQD
    My Best Camera - Sony A7 3 - https://amzn.to/3ZjAkAJ
    My Sound - GODOX MoveLink M2 - https://amzn.to/3JcqaMJ
    My Light setup - GODOX LC500R RGB LED Light Stick - https://amzn.to/3SQmu6P
    My Lens Setup - Sigma 18-35mm f/1.8 DC for Canon - https://amzn.to/3ZDqbyD
    My Lens Setup - Canon EF50MM F/1.8 STM Lens - https://amzn.to/41CEeX4
    My Audio Setup - Zoom H1n Handy Recorder - https://amzn.to/3mudhFa

    Home Bar Accessories - https://amzn.to/3LedEOv
    Glassware - https://amzn.to/3KRPSrf
    Ice mould - https://amzn.to/3EWlecr

    Disclaimer:
    The purpose of this channel is not to support or encourage underage drinking but to provide knowledge of the products we consume. This channel does not promote or sell any alcoholic product. The purpose of this channel is to strictly entertain and inform people about products available on the market. We are strictly against underage drinking and do not support it.

    About The Channel:-
    If you love homestyle cocktails, reviews of Alcohol, Drink knowledge, Bartending and many more then this channel is for you. India is the biggest alcohol con

    Cooking video | 702 views

  • Watch What is Wheat Beer? | व्हीट बीयर क्या है? | #shorts Video
    What is Wheat Beer? | व्हीट बीयर क्या है? | #shorts

    What is Wheat Beer? | व्हीट बीयर क्या है?

    Join Our Bartending School The Spirit Vidyalaya, Call us on 7558204535

    Check out our website - www.cocktailsindia.com

    Check out my Podcast - 'Dada Bartender Podcast' https://open.spotify.com/show/0ub0ll4SUUWwHDo5qk5Nb5?si=7b3ac81e1c194caf

    Please follow me on Instagram: https://www.instagram.com/cocktailsindia2016/

    Instagram (2): www.instagram.com/dada.bartender

    Please follow me on Facebook: https://www.facebook.com/profile.php?id=100092566239501&mibextid=LQQJ4d

    For Business / Suggestion: dada@cocktailsindia.com
    sponsor.cocktailsindia@gmail.com

    Affiliate Link
    ********************************************************************
    My Camera - Canon EOS 200D II - Link To Purchase - https://amzn.to/3ZXuNQD
    My Best Camera - Sony A7 3 - https://amzn.to/3ZjAkAJ
    My Sound - GODOX MoveLink M2 - https://amzn.to/3JcqaMJ
    My Light setup - GODOX LC500R RGB LED Light Stick - https://amzn.to/3SQmu6P
    My Lens Setup - Sigma 18-35mm f/1.8 DC for Canon - https://amzn.to/3ZDqbyD
    My Lens Setup - Canon EF50MM F/1.8 STM Lens - https://amzn.to/41CEeX4
    My Audio Setup - Zoom H1n Handy Recorder - https://amzn.to/3mudhFa

    Home Bar Accessories - https://amzn.to/3LedEOv
    Glassware - https://amzn.to/3KRPSrf
    Ice mould - https://amzn.to/3EWlecr

    Disclaimer:
    The purpose of this channel is not to support or encourage underage drinking but to provide knowledge of the products we consume. This channel does not promote or sell any alcoholic product. The purpose of this channel is to strictly entertain and inform people about products available on the market. We are strictly against underage drinking and do not support it.

    About The Channel:-
    If you love homestyle cocktails, reviews of Alcohol, Drink knowledge, Bartending and many more then this channel is for you. India is the biggest alcohol consumer in th

    Cooking video | 678 views

  • Watch Which is the First BAR in India? Do you know? | भारत में पहला BAR कौन सा है? | #shorts Video
    Which is the First BAR in India? Do you know? | भारत में पहला BAR कौन सा है? | #shorts

    भारत में पहला BAR कौन सा है? Which is the First BAR in India? Do you know?

    #firstbar #Indiasfirstbar #bar #cocktailsindia

    Check out my Podcast - 'Dada Bartender Podcast' https://open.spotify.com/show/0ub0ll4SUUWwHDo5qk5Nb5?si=7b3ac81e1c194caf

    Please follow me on Instagram: https://www.instagram.com/cocktailsindia2016/
    Please follow me on Facebook: https://www.facebook.com/cocktailsindia1975/
    For Business / Suggestion: sponsor.cocktailsindia@gmail.com

    Affiliate Link
    ********************************************************************
    My Camera - Canon EOS 200D II - Link To Purchase - https://amzn.to/3ZXuNQD
    My Best Camera - Sony A7 3 - https://amzn.to/3ZjAkAJ
    My Sound - GODOX MoveLink M2 - https://amzn.to/3JcqaMJ
    My Light setup - GODOX LC500R RGB LED Light Stick - https://amzn.to/3SQmu6P
    My Lens Setup - Sigma 18-35mm f/1.8 DC for Canon - https://amzn.to/3ZDqbyD
    My Lens Setup - Canon EF50MM F/1.8 STM Lens - https://amzn.to/41CEeX4
    My Audio Setup - Zoom H1n Handy Recorder - https://amzn.to/3mudhFa

    Home Bar Accessories - https://amzn.to/3LedEOv
    Glassware - https://amzn.to/3KRPSrf
    Ice mould - https://amzn.to/3EWlecr

    Disclaimer:
    The purpose of this channel is not to support or encourage underage drinking but to provide knowledge of the products we consume. This channel does not promote or sell any alcoholic product. The purpose of this channel is to strictly entertain and inform people about products available on the market. We are strictly against underage drinking and do not support it.

    About The Channel:-
    If you love homestyle cocktails, reviews of Alcohol, Drink knowledge, Bartending and many more then this channel is for you. India is the biggest alcohol consumer in the world. We buy and consume more whiskey in the world than anyone else. This channel helps give information about your favorite drink. How to make fantastic cocktails at ho

    Cooking video | 625 views

  • Watch एक Wine की बोतल की सेल्फ लाइफ क्या होती है? | What is the shelf-life of a bottle of wine? | #shorts Video
    एक Wine की बोतल की सेल्फ लाइफ क्या होती है? | What is the shelf-life of a bottle of wine? | #shorts

    एक Wine की बोतल की सेल्फ लाइफ क्या होती है? What is the shelf-life of a bottle of wine?
    #wine #Wineshelflife #cocktailsindia #dadabartender


    Join Our Bartending School The Spirit Vidyalaya, Call us on 7558204535

    Check out our website - www.cocktailsindia.com

    Check out my Podcast - 'Dada Bartender Podcast' https://open.spotify.com/show/0ub0ll4SUUWwHDo5qk5Nb5?si=7b3ac81e1c194caf

    Please follow me on Instagram: https://www.instagram.com/cocktailsindia2016/

    Instagram (2): www.instagram.com/dada.bartender

    Please follow me on Facebook: https://www.facebook.com/profile.php?id=100092566239501&mibextid=LQQJ4d

    For Business / Suggestion: dada@cocktailsindia.com
    sponsor.cocktailsindia@gmail.com

    Affiliate Link
    ********************************************************************
    My Camera - Canon EOS 200D II - Link To Purchase - https://amzn.to/3ZXuNQD
    My Best Camera - Sony A7 3 - https://amzn.to/3ZjAkAJ
    My Sound - GODOX MoveLink M2 - https://amzn.to/3JcqaMJ
    My Light setup - GODOX LC500R RGB LED Light Stick - https://amzn.to/3SQmu6P
    My Lens Setup - Sigma 18-35mm f/1.8 DC for Canon - https://amzn.to/3ZDqbyD
    My Lens Setup - Canon EF50MM F/1.8 STM Lens - https://amzn.to/41CEeX4
    My Audio Setup - Zoom H1n Handy Recorder - https://amzn.to/3mudhFa

    Home Bar Accessories - https://amzn.to/3LedEOv
    Glassware - https://amzn.to/3KRPSrf
    Ice mould - https://amzn.to/3EWlecr

    Disclaimer:
    The purpose of this channel is not to support or encourage underage drinking but to provide knowledge of the products we consume. This channel does not promote or sell any alcoholic product. The purpose of this channel is to strictly entertain and inform people about products available on the market. We are strictly against underage drinking and do not support it.

    About The Channel:-
    If you love homestyle cocktails, reviews of Alcohol, Drink kn

    Cooking video | 644 views