ISO 27001:2021 The ISO 27001:2013 is about to be replaced by an updated and improved version. This version will introduce new categories and controls for […]
How Deception Technology Adds Value To Security Operations.
Deception technology is a cybersecurity defense practice that aims to deceive attackers by distributing a collection of traps and decoys across a system’s infrastructure to […]
Proactive Defense Against Business Email Compromise (BEC)
What is Business Email Compromise Business Email Compromise (BEC) is a type of attack in which the attacker poses as a trusted entity typically a […]
The QR Code Attack Vector
QR stands for “Quick Response” and QR codes are square-shaped machine-readable data formats that are useful for anything that needs to be scanned automatically. Before […]
CTI Digest: ProxyShell, Sardonic from FIN8, & Telecom Giant’s Breach to Proliferation of NSO Spyware.
Proliferation of NSO Spyware Late June, leak uncovers global abuse of cyber-surveillance weapon from the NSO group, th e popular hacking spyware called Pegasus. Report […]
MSSP: Benefits for Businesses
What is MSSP Manage Security Service Provider (MSSP) provide a complete outsourced security solution for an organization. The core of the MSSP business is providing […]