Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Breakdown of an Impersonation Attack: Using IPFS and Personalization to Improve Attack Success

Details from a simple impersonation phishing attack show how well thought out these attacks really are in order to heighten their ability to fool victims and harvest credentials. Credential harvesting scams are pretty simple at face value: send an email that links to a spoofed login page/website, and let the credentials roll on in.

What is NFV

In today's fast-paced digital landscape, businesses proactively seek innovative ways to optimize their networks, enhance operational efficiency, and reduce costs. Network Functions Virtualization (NFV) emerges as a transformative technology that leads the charge. NFV revolutionizes traditional, hardware-based network functions by converting them into flexible, software-based solutions.

7 Most Secure and Private Messenger Apps

People using messaging apps crave a dedicated space to conveniently chat, collaborate and organize with others. However, there are growing concerns about data privacy for at least 8 in 10 adult consumers worldwide. These are the people who have fallen prey to online scams due to privacy breaches. While some consumers would happily do a data trade-off on certain aspects of online safety for increased convenience, a vast majority would rather not.

Top 5 Malware Trends on the Horizon

Cybercrime has become a dominant concern for many businesses, as well as individuals. Cybercriminals will target any business, and any individual if they can realize a profit from their minimal efforts. One of the ways that criminals achieve their goals is through the use of malware that garners a fast profit, such as ransomware. More enterprising criminals will use more persistent malware, which enables them to return to the target for further victimization.

Weekly Cyber Security News 15/06/2023

A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24. A curious but could be deadly lure for researchers, though to be honest, one look at the fake PoC code and alarm bells should ring. I suppose it only takes a few accidental mistakes to make it worth while.

Android App Penetration Testing Checklist with 154 Test cases [Free Excel File]

Get Free Android App Penetration Testing Checklist With 2.9 million apps, the Android Play Store is the most widely adopted mobile operating system. With its vast opportunities, Android also draws the attention of malicious hackers who continuously seek to exploit weaknesses in mobile applications. Because of security concerns, Google has banned many apps from the Play Store. Building a secure Android app requires thorough mobile application penetration testing.

EDR, XDR & MDR in 2023: Which Detection & Response System Is Best?

In this article, I’m looking at the key differences between endpoint detection and response (EDR) and the related extended and managed options, XDR and MDR. Here’s the short version: Now let’s dig in to get a bit more context on this cybersecurity fundamental.