Search Results for: transfer data Blog Post Zero-days in Accellion file transfer app used for data theft March 4, 2021 Back in December 2020, a software vendor Accellion informed about an actively exploited zero-day vulnerability in its File Transfer Appliance... Blog Post Three Lessons the Accellion FTA Hack of Shell Reminded Us April 6, 2021 At the beginning of March, we informed about four actively exploited zero-day vulnerabilities in the Accellion file transfer appliance (FTA).... Blog Post Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps... Blog Post Attacks on Internet of Things. How to Reduce Cost and Improve Safety of IoT? June 3, 2020 In the world of technology, the term ‘Internet of Things‘, can be any natural or man-made object that has an... Page Business email compromise attacks (BEC) April 2, 2019 Phishing is the main ingredient of most cyberattacks and successful data breaches. Human factor is still among the most difficult... Blog Post The Alarming Growth of Cybersecurity Threats That Leave All Sectors Vulnerable December 16, 2021 The rise of the internet has encouraged companies’ rapid adoption of technology. That results in the simplification of online transactions.... Blog Post Why Do You Need To Be Concerned About HTTP Request Smuggling? October 21, 2021 Over the last few months, HTTP request smuggling, the security exploit on the HTTP protocol, has gained extensive community attention.... Blog Post Exchange/Outlook Autodiscover Bug Spills 100K+ Email Passwords October 20, 2021 A study conducted by Guardicore security researcher Amit Serper recently demonstrated the potential for large-scale credentials compromise owing to a... Blog Post Common Techniques by Which Malware Makes Itself Persistent January 19, 2021 A hacker wants to keep its malware to stay on the target device, even when the operating system restarts. Do you know... Blog Post Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more... Blog Post Do deep fake cyber-attacks pose an imminent threat? July 1, 2021 We’ve all seen the videos before. Today, most deepfake videos we see consist of influential people or celebrities being realistically... Blog Post Attacks Are Getting Pricier: Average Ransomware Payment Ramped Up By 60% January 4, 2021 Ransomware is a severe and recurring cyberattack nowadays. It happens when a cyber threat actor locks a company’s data with... Blog Post Do You Have a Data Loss Prevention (DLP)? May 29, 2020 In a normal course, business might send many kinds of data across the network. These might include sensitive information like... Blog Post How Internet of Things (IoT) works? July 1, 2020 What is IOT? The ability to access devices through a smartphone or through a computer is called IoT. It started... Blog Post Cryptocurrency Mixers and Their Use In Ransomware August 15, 2020 Are cryptocurrencies anonymous? Cryptocurrencies should be both transparent and anonymous. Transparency means that everyone can check all the incoming and...
Blog Post Zero-days in Accellion file transfer app used for data theft March 4, 2021 Back in December 2020, a software vendor Accellion informed about an actively exploited zero-day vulnerability in its File Transfer Appliance...
Blog Post Three Lessons the Accellion FTA Hack of Shell Reminded Us April 6, 2021 At the beginning of March, we informed about four actively exploited zero-day vulnerabilities in the Accellion file transfer appliance (FTA)....
Blog Post Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps...
Blog Post Attacks on Internet of Things. How to Reduce Cost and Improve Safety of IoT? June 3, 2020 In the world of technology, the term ‘Internet of Things‘, can be any natural or man-made object that has an...
Page Business email compromise attacks (BEC) April 2, 2019 Phishing is the main ingredient of most cyberattacks and successful data breaches. Human factor is still among the most difficult...
Blog Post The Alarming Growth of Cybersecurity Threats That Leave All Sectors Vulnerable December 16, 2021 The rise of the internet has encouraged companies’ rapid adoption of technology. That results in the simplification of online transactions....
Blog Post Why Do You Need To Be Concerned About HTTP Request Smuggling? October 21, 2021 Over the last few months, HTTP request smuggling, the security exploit on the HTTP protocol, has gained extensive community attention....
Blog Post Exchange/Outlook Autodiscover Bug Spills 100K+ Email Passwords October 20, 2021 A study conducted by Guardicore security researcher Amit Serper recently demonstrated the potential for large-scale credentials compromise owing to a...
Blog Post Common Techniques by Which Malware Makes Itself Persistent January 19, 2021 A hacker wants to keep its malware to stay on the target device, even when the operating system restarts. Do you know...
Blog Post Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more...
Blog Post Do deep fake cyber-attacks pose an imminent threat? July 1, 2021 We’ve all seen the videos before. Today, most deepfake videos we see consist of influential people or celebrities being realistically...
Blog Post Attacks Are Getting Pricier: Average Ransomware Payment Ramped Up By 60% January 4, 2021 Ransomware is a severe and recurring cyberattack nowadays. It happens when a cyber threat actor locks a company’s data with...
Blog Post Do You Have a Data Loss Prevention (DLP)? May 29, 2020 In a normal course, business might send many kinds of data across the network. These might include sensitive information like...
Blog Post How Internet of Things (IoT) works? July 1, 2020 What is IOT? The ability to access devices through a smartphone or through a computer is called IoT. It started...
Blog Post Cryptocurrency Mixers and Their Use In Ransomware August 15, 2020 Are cryptocurrencies anonymous? Cryptocurrencies should be both transparent and anonymous. Transparency means that everyone can check all the incoming and...