Security technology

How kids coped with COVID-hit winter holidays

Due to the pandemic situation in late 2020, street festivities got canceled worldwide. For many families, get-togethers with grandparents over… Read More

3 years ago

Adaptive protection against invisible threats

Corporate endpoint security technologies for mid-sized companies struggle to surprise us with anything brand new. They provide reliable protection against… Read More

3 years ago

How we protect our users against the Sunburst backdoor

What transpired SolarWinds, a properly-identified IT managed companies supplier, has just lately turn into a sufferer of a cyberattack. Their… Read More

3 years ago

Lookalike domains and how to outfox them

Our colleagues now delved into how cybercriminals attack organizations via compromised email addresses of staff, and how to defend versus… Read More

3 years ago

Why master YARA: from routine to extreme threat hunting cases. Follow-up

On 3rd of September, we were hosting our “Experts Talk. Why master YARA: from routine to extreme threat hunting cases“,… Read More

4 years ago

Cybersecurity Research During the Coronavirus Outbreak and After

Cybersecurity Analysis In the course of the Coronavirus Outbreak and After Resource link Study Far more on Pentesting Equipment Read More

4 years ago