Deception technology is a cybersecurity defense practice that aims to deceive attackers by distributing a collection of traps and decoys across a system’s infrastructure to […]
Proactive Defense Against Business Email Compromise (BEC)
What is Business Email Compromise Business Email Compromise (BEC) is a type of attack in which the attacker poses as a trusted entity typically a […]
The QR Code Attack Vector
QR stands for “Quick Response” and QR codes are square-shaped machine-readable data formats that are useful for anything that needs to be scanned automatically. Before […]
CTI Digest: ProxyShell, Sardonic from FIN8, & Telecom Giant’s Breach to Proliferation of NSO Spyware.
Proliferation of NSO Spyware Late June, leak uncovers global abuse of cyber-surveillance weapon from the NSO group, th e popular hacking spyware called Pegasus. Report […]
MSSP: Benefits for Businesses
What is MSSP Manage Security Service Provider (MSSP) provide a complete outsourced security solution for an organization. The core of the MSSP business is providing […]
Building a Security-First Culture with Remote Teams.
The COVID-19 pandemic has heightened the transition of many businesses to remote work arrangements. While these changes have come to stay, it brings to fore […]