Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

A.I - Trick or T(h)reat?

Artificial Intelligence, often abbreviated to AI, refers to the development of computer systems capable of carrying out tasks and rendering decisions that traditionally demand human intelligence. This entails the creation of algorithms and models that empower machines to acquire knowledge from data, discern patterns, and adjust to unique information or scenarios.

Ransomware Trends 2023, Q3 Report

Q3 will be remembered as a new record for the ransomware industry as it was the most successful quarter ever recorded. While the number skyrocketed in Q2 with 1386 cases, in Q3, the ransomware industry was able to surpass this number with 1420 cases. With no surprise, the U.S. continues to be the most targeted country by ransomware, while the business services sector is the most targeted sector.

Introducing DataTrails provenance automation for Dropbox files

We are thrilled to announce a new integration with Dropbox that enables verifiable provenance metadata to be automatically created for content you store and manage on Dropbox. With the onset of generative AI and the increasing threats of fake data and fraud, the ability to prove ownership of your content and protect it from misuse is more urgent now than ever.

Understanding the Cost of Legal Consultation

A case requiring resolution in court or by an experienced attorney presents its own difficulties. You can occasionally worry that your case is too pricey because hiring a lawyer might be too expensive. Most law firms will offer you an excellent guide on making the payment. You can always consult a professional law firm to assist with this information.

Rhadamanthys malware analysis: How infostealers use VMs to avoid analysis

The infostealer malware Rhadamanthys was discovered in the last quarter of 2022. Its capabilities showed a special interest in crypto currency wallets, targeting both wallet clients installed in the victim’s machine and browser extensions. The main distribution methods observed for this threat are fake software websites promoted through Google Ads, and phishing emails, without discriminating by region or vertical.

Cybersecurity: a key player for the present and future of business

Cybersecurity Awareness Month has been celebrated every October for 20 years. This initiative, promoted by the Cybersecurity and Infrastructure Agency (CISA) with the support of the National Cybersecurity Alliance, aims to raise awareness of the importance of implementing a comprehensive cybersecurity system.

A Deep Dive into the History of Cyber Security Awareness Month

Happy Cybersecurity Awareness Month! Since 2004, the United States has recognized October as Cybersecurity Awareness Month. The president at the time, George Bush, alongside the United States Congress, declared October as the month to dedicate to cybersecurity and raise awareness about the importance of protecting sensitive information in the following sectors: Each of these sectors plays a significant role in shaping society's social, economic, and political landscape in the past, future, and present.

Key Takeaways from the 2023 Domain Impersonation Report

One of the most pervasive and unavoidable threats on the internet, domain impersonation can be used by bad actors as the basis for a wide range of attacks. The various ways in which cybercriminals make use of lookalike domains often fluctuate, and the first half of 2023 has exemplified this fact. Staying on top of security and not falling victim to these attacks requires knowing what the dangers are and keeping track of the threats that are likely to spring up.

What is NERC? Everything you need to know

Electric grids are part of every nation’s critical infrastructure. Every societal activity and business depends on reliable and safe electricity distribution. The US electric grid is a huge network of powerlines, distribution hubs, and renewable and non-renewable energy generators that is increasingly exposed to cyber-physical risks due to the accelerated reliance on cyber-enabled systems and IoT-connected devices, such as smart meters.