Security Events During SummerCybersecurity and related events continue into the summer period. Organizations working in this field are also now offering several events,... BLOG Fight Staff Burnout: Cybersecurity Teams Overworked, Understaffed July 19, 2021 Fight Staff Burnout: Cybersecurity Teams Overworked, Understaffed – Those working in the cybersecurity field have made it through this pandemic... Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more... Cybersecurity Events Tips for March and April March 18, 2021 The cybersecurity goes ahead even in these special times. Organizations dedicated to this area also provide several events, webinars and... The 2020 National Cybersecurity Awareness Month (NCSAM) October 21, 2020 In a year when many businesses have had to move their operations online, the need to protect digital devices has... Phishing Awareness Training Effective Only for a Few Months October 12, 2020 In the majority of cyber breaches, phishing attacks are the root cause. Phishing awareness training sensitizes a company’s employees to... Has Your Home Network Been Compromised!? September 29, 2020 Have you ever wondered if you would notice that your home network was compromised? Attackers can be stealthy, and they... 5 ways To Improve Security Awareness Training August 20, 2020 The weakest link of the cybersecurity chain is the user. Therefore, expensive antivirus and software may not always hold up... Cyber Security Lessons Learned From The Pandemic August 11, 2020 Even as world starts to open up, many companies are choosing to keep employees home. However, the sudden change in... DEF CON Hacking Conference: “Hunting for Blue Mockingbird Coinminers” August 5, 2020 Hunting for Blue Mockingbird Coinminers. 100,000+ USD damage. 10,000+ USD mined. 1,000+ infected computers. 100+ malicious artifacts. 10+ malwares… Learn... A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... Gargamel is a tool for acquiring the forensic evidence July 16, 2020 Gargamel is a Windows tool for acquiring the forensic evidence from remote Windows or Linux machines using several different methods.... Americans Unconcerned About Data Security During Covid-19 Era July 16, 2020 In this article we will cover the following topics: Citizens lack awareness of cyber security despite growing number of attacks ... 10 ways to detect phishing emails June 29, 2020 Phishing email is a type of online scam when a cyber criminal sends an email that appears from a legitimate... How does Public Wi-Fi Allow Cyber Thievery? June 26, 2020 Public Wi-Fi is everywhere – parks, coffeeshops, airports, hotels, public transit, libraries, and restaurants. We have also heard time and... Social engineering Life-Cycle June 17, 2020 According to Cert-Uk definition, Social Engineering refers to the manipulation of individuals in order to induce them to carry out...
Security Events During SummerCybersecurity and related events continue into the summer period. Organizations working in this field are also now offering several events,...
BLOG Fight Staff Burnout: Cybersecurity Teams Overworked, Understaffed July 19, 2021 Fight Staff Burnout: Cybersecurity Teams Overworked, Understaffed – Those working in the cybersecurity field have made it through this pandemic... Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more... Cybersecurity Events Tips for March and April March 18, 2021 The cybersecurity goes ahead even in these special times. Organizations dedicated to this area also provide several events, webinars and... The 2020 National Cybersecurity Awareness Month (NCSAM) October 21, 2020 In a year when many businesses have had to move their operations online, the need to protect digital devices has... Phishing Awareness Training Effective Only for a Few Months October 12, 2020 In the majority of cyber breaches, phishing attacks are the root cause. Phishing awareness training sensitizes a company’s employees to... Has Your Home Network Been Compromised!? September 29, 2020 Have you ever wondered if you would notice that your home network was compromised? Attackers can be stealthy, and they... 5 ways To Improve Security Awareness Training August 20, 2020 The weakest link of the cybersecurity chain is the user. Therefore, expensive antivirus and software may not always hold up... Cyber Security Lessons Learned From The Pandemic August 11, 2020 Even as world starts to open up, many companies are choosing to keep employees home. However, the sudden change in... DEF CON Hacking Conference: “Hunting for Blue Mockingbird Coinminers” August 5, 2020 Hunting for Blue Mockingbird Coinminers. 100,000+ USD damage. 10,000+ USD mined. 1,000+ infected computers. 100+ malicious artifacts. 10+ malwares… Learn... A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... Gargamel is a tool for acquiring the forensic evidence July 16, 2020 Gargamel is a Windows tool for acquiring the forensic evidence from remote Windows or Linux machines using several different methods.... Americans Unconcerned About Data Security During Covid-19 Era July 16, 2020 In this article we will cover the following topics: Citizens lack awareness of cyber security despite growing number of attacks ... 10 ways to detect phishing emails June 29, 2020 Phishing email is a type of online scam when a cyber criminal sends an email that appears from a legitimate... How does Public Wi-Fi Allow Cyber Thievery? June 26, 2020 Public Wi-Fi is everywhere – parks, coffeeshops, airports, hotels, public transit, libraries, and restaurants. We have also heard time and... Social engineering Life-Cycle June 17, 2020 According to Cert-Uk definition, Social Engineering refers to the manipulation of individuals in order to induce them to carry out...
Fight Staff Burnout: Cybersecurity Teams Overworked, Understaffed July 19, 2021 Fight Staff Burnout: Cybersecurity Teams Overworked, Understaffed – Those working in the cybersecurity field have made it through this pandemic...
Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more...
Cybersecurity Events Tips for March and April March 18, 2021 The cybersecurity goes ahead even in these special times. Organizations dedicated to this area also provide several events, webinars and...
The 2020 National Cybersecurity Awareness Month (NCSAM) October 21, 2020 In a year when many businesses have had to move their operations online, the need to protect digital devices has...
Phishing Awareness Training Effective Only for a Few Months October 12, 2020 In the majority of cyber breaches, phishing attacks are the root cause. Phishing awareness training sensitizes a company’s employees to...
Has Your Home Network Been Compromised!? September 29, 2020 Have you ever wondered if you would notice that your home network was compromised? Attackers can be stealthy, and they...
5 ways To Improve Security Awareness Training August 20, 2020 The weakest link of the cybersecurity chain is the user. Therefore, expensive antivirus and software may not always hold up...
Cyber Security Lessons Learned From The Pandemic August 11, 2020 Even as world starts to open up, many companies are choosing to keep employees home. However, the sudden change in...
DEF CON Hacking Conference: “Hunting for Blue Mockingbird Coinminers” August 5, 2020 Hunting for Blue Mockingbird Coinminers. 100,000+ USD damage. 10,000+ USD mined. 1,000+ infected computers. 100+ malicious artifacts. 10+ malwares… Learn...
A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every...
Gargamel is a tool for acquiring the forensic evidence July 16, 2020 Gargamel is a Windows tool for acquiring the forensic evidence from remote Windows or Linux machines using several different methods....
Americans Unconcerned About Data Security During Covid-19 Era July 16, 2020 In this article we will cover the following topics: Citizens lack awareness of cyber security despite growing number of attacks ...
10 ways to detect phishing emails June 29, 2020 Phishing email is a type of online scam when a cyber criminal sends an email that appears from a legitimate...
How does Public Wi-Fi Allow Cyber Thievery? June 26, 2020 Public Wi-Fi is everywhere – parks, coffeeshops, airports, hotels, public transit, libraries, and restaurants. We have also heard time and...
Social engineering Life-Cycle June 17, 2020 According to Cert-Uk definition, Social Engineering refers to the manipulation of individuals in order to induce them to carry out...