Our 2020 threat summary reflects an unprecedented year in so many ways. The global threat environment was visibly affected, with cyber criminals making...
The internet may seem like an infinite, restrictionless space, but we often bump into virtual walls that prevent access to certain content. Geo-blocking...
NAIKON is a threat actor that has been active for more than a decade. The group focuses on high profile targets such as government agencies and military...
Security breaches show no signs of slowing, and credential theft headlines are the number one attack vector. Privileged access has become hackers’ brass...
How many of you still participate in-person meetings on a daily basis? If this question was asked before the beginning of 2020, it would have raised several...
Ransomware is not just another buzzword. It is a very real threat to educational institutions of all sizes, from K-12 to Universities. In this White Paper,...
With the rise of hybrid work and the increase in cyber threats, attackers are increasingly targeting account takeovers in an attempt to gain access to...
On January 1, 2020, the United States Department of Defense (DoD) released its Cybersecurity Maturity Model Certification (CMMC) requirements. These new...
Initiatives such as Data Privacy Week are important in raising consumer awareness around data privacy. Not just in terms of the measures that they can...
When visiting a new city, a GPS app is a must have. But when drivers are travelling in their own hometowns, they often disregard their GPS’s directions,...
Threat actors are turning to supply chain-based attacks as a means of exploiting customer-supplier relationships to infiltrate organizations. According...
Our world has never moved faster in terms of cyber threats, security technology innovations and overall business transformation. The complexity of today’s...
‘Darkshades’ is a RAT (Remote Access Trojan) that targets Android devices. It enables criminals to steal contacts, track location accurately, exfiltrate...
We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them