Category Cybersecurity
In the ever-changing world of medical technology, cybersecurity is a major concern for medical device manufacturers. The U.S. Food and Drug Administration (FDA) has established strict cybersecurity requirements for these...
AppSec, short for Application Security, is the practice of securing applications by identifying and addressing potential threats throughout the software development life cycle. It aims to protect applications from attacks...
Are you looking to secure your data and organization while growing your operations? If so, purple teaming could be the answer. By combining red and blue teams, purple teaming is...
The security industry is full of buzzwords and phrases that often confuse newcomers. You may have encountered the term ‘Red Team vs. Blue Team,’ but understanding its meaning and relevance...
Given the ever-evolving nature of cyber threats, organizations must remain vigilant and prioritize security measures to protect their digital assets. As reported in the IBM 2022 Cost of a Data...
Are you well-prepared to safeguard your applications from cyberattacks? You may have heard of methods like penetration testing, source code analysis, and vulnerability scanning. But these techniques are not enough!...
There have been many talks lately about the recent OpenSSL vulnerabilities (CVE-2022-3602 and CVE-2022-3786). But what exactly is it, and What does this mean for you and your business? This...
Shellshock, Heartbleed and now TEXT4SHELL. The list of critical security vulnerabilities seems to be growing daily, and it can be hard to track them all. TEXT4SHELL is a vulnerability that...
We live in a data-driven world filled with multiple software and products that demand confidentiality, integrity, and availability at every cost. Those products also encompass critical functionalities and require a...
In this era of digital technology, where technology is evolving and growing exponentially, and everything is being digitized, cyber threats and threat actors are also evolving at an alarming pace....
On December 10, 2021, cyberspace got flooded with a critical vulnerability in the popular java-based logging package log4j. The vulnerability is now called Log4Shell and published as CVE-2021-44228 with a...
In the previous blog post on how OSINT is used in cybersecurity, we discussed what OSINT is, who uses it, and how it helps launch a cyber attack.
Prior to cloud computing, we were used to downloading and installing applications for our use. Organizations were habitual in creating their data center, hiring IT professionals, buying servers and related...
The cybersecurity industry has seen massive growth in social engineering, especially phishing attacks, over the last few years. The recently published DBIR report in May 2021 has shared an 11%...
In today’s technology-driven world, information/data is one of the most significant assets to every business and industry model. It is an evenly necessary element required to make or break the...
The fourth industrial revolution has led to a sheer amount of technologies and advantages in the form of global digitization, which is creating an expansion in business productivity, revenues, and...
With the internet revolution and application modernization, our lives have been profoundly surrounded by tons of applications, be it health care applications or enterprise and database software. Everything is making...
IoT technologies have been with us for quite a long time, and with the passage of time and fast development of Wireless Internet and 5G, it is becoming fundamental for...
The previous few months have been a roller coaster ride for the entire security industry because of the emerging cyber-attacks targeting security organizations, researchers, and service providers. The rise of...
Often, it gets hard to understand the differences between some of the security assessments as most of the security activities complement each other at many points. With the growing and...
For quite a good time, there has been a lot of buzz around third-party data breaches. 2020 has been a year full of cyber-attacks, and the pandemic has worked as...
Many people consider bug bounties and Pentests (often referred to as Penetration Testing) as synonymous. If you’re relatively new to cybersecurity, it’s easy to confuse the two and not quite...
The shocking reality is that security breaches have increased by about 67% over the past five years, and in 2020 chances that more companies may eventually get hacked are high....
Cybercrime is still a big concern. While businesses put different technologies to patch the known risk profiles, several new vulnerabilities keep springing up in fact that fresh cyberattacks are recorded...
According to the UNDP, the Covid-19 pandemic is the most significant predicament that has hit us since World War Two. Since its advent, countries have been racing around the clock...
As the coronavirus wreaks havoc around the world, hackers and scammers are seizing on the chaos to launch more phishing attacks. According to research done by Barracuda, Covid-19 related emails...
Covid-19 is compelling businesses to permit employees to work from home! Some of the big tech companies that have been impacted by the Coronavirus crisis allowed employees to work remotely...
Due to the Coronavirus (Covid-19) pandemic, World Health Organization (WHO) strongly advises that you stay at least 3-feet away from anyone who is either sneezing or coughing. People are also...
Category Covid-19
According to the UNDP, the Covid-19 pandemic is the most significant predicament that has hit us since World War Two. Since its advent, countries have been racing around the clock...
As the coronavirus wreaks havoc around the world, hackers and scammers are seizing on the chaos to launch more phishing attacks. According to research done by Barracuda, Covid-19 related emails...
Covid-19 is compelling businesses to permit employees to work from home! Some of the big tech companies that have been impacted by the Coronavirus crisis allowed employees to work remotely...
Due to the Coronavirus (Covid-19) pandemic, World Health Organization (WHO) strongly advises that you stay at least 3-feet away from anyone who is either sneezing or coughing. People are also...
Category Telecommute
Covid-19 is compelling businesses to permit employees to work from home! Some of the big tech companies that have been impacted by the Coronavirus crisis allowed employees to work remotely...
Due to the Coronavirus (Covid-19) pandemic, World Health Organization (WHO) strongly advises that you stay at least 3-feet away from anyone who is either sneezing or coughing. People are also...
Category Phishing
The cybersecurity industry has seen massive growth in social engineering, especially phishing attacks, over the last few years. The recently published DBIR report in May 2021 has shared an 11%...
The fourth industrial revolution has led to a sheer amount of technologies and advantages in the form of global digitization, which is creating an expansion in business productivity, revenues, and...
As the coronavirus wreaks havoc around the world, hackers and scammers are seizing on the chaos to launch more phishing attacks. According to research done by Barracuda, Covid-19 related emails...
Category RDP
According to the UNDP, the Covid-19 pandemic is the most significant predicament that has hit us since World War Two. Since its advent, countries have been racing around the clock...
Category Bruteforce
According to the UNDP, the Covid-19 pandemic is the most significant predicament that has hit us since World War Two. Since its advent, countries have been racing around the clock...
Category Windows
According to the UNDP, the Covid-19 pandemic is the most significant predicament that has hit us since World War Two. Since its advent, countries have been racing around the clock...
Category Git
Cybercrime is still a big concern. While businesses put different technologies to patch the known risk profiles, several new vulnerabilities keep springing up in fact that fresh cyberattacks are recorded...
Category SourceCodeDiscloure
The shocking reality is that security breaches have increased by about 67% over the past five years, and in 2020 chances that more companies may eventually get hacked are high....
Cybercrime is still a big concern. While businesses put different technologies to patch the known risk profiles, several new vulnerabilities keep springing up in fact that fresh cyberattacks are recorded...
Category Vulnerability
In the ever-changing world of medical technology, cybersecurity is a major concern for medical device manufacturers. The U.S. Food and Drug Administration (FDA) has established strict cybersecurity requirements for these...
AppSec, short for Application Security, is the practice of securing applications by identifying and addressing potential threats throughout the software development life cycle. It aims to protect applications from attacks...
Are you looking to secure your data and organization while growing your operations? If so, purple teaming could be the answer. By combining red and blue teams, purple teaming is...
The security industry is full of buzzwords and phrases that often confuse newcomers. You may have encountered the term ‘Red Team vs. Blue Team,’ but understanding its meaning and relevance...
Given the ever-evolving nature of cyber threats, organizations must remain vigilant and prioritize security measures to protect their digital assets. As reported in the IBM 2022 Cost of a Data...
There have been many talks lately about the recent OpenSSL vulnerabilities (CVE-2022-3602 and CVE-2022-3786). But what exactly is it, and What does this mean for you and your business? This...
Shellshock, Heartbleed and now TEXT4SHELL. The list of critical security vulnerabilities seems to be growing daily, and it can be hard to track them all. TEXT4SHELL is a vulnerability that...
The fourth industrial revolution has led to a sheer amount of technologies and advantages in the form of global digitization, which is creating an expansion in business productivity, revenues, and...
The shocking reality is that security breaches have increased by about 67% over the past five years, and in 2020 chances that more companies may eventually get hacked are high....
Cybercrime is still a big concern. While businesses put different technologies to patch the known risk profiles, several new vulnerabilities keep springing up in fact that fresh cyberattacks are recorded...
Category Pentest
In the ever-changing world of medical technology, cybersecurity is a major concern for medical device manufacturers. The U.S. Food and Drug Administration (FDA) has established strict cybersecurity requirements for these...
The fourth industrial revolution has led to a sheer amount of technologies and advantages in the form of global digitization, which is creating an expansion in business productivity, revenues, and...
IoT technologies have been with us for quite a long time, and with the passage of time and fast development of Wireless Internet and 5G, it is becoming fundamental for...
The previous few months have been a roller coaster ride for the entire security industry because of the emerging cyber-attacks targeting security organizations, researchers, and service providers. The rise of...
The shocking reality is that security breaches have increased by about 67% over the past five years, and in 2020 chances that more companies may eventually get hacked are high....
Category Pentesting
In the ever-changing world of medical technology, cybersecurity is a major concern for medical device manufacturers. The U.S. Food and Drug Administration (FDA) has established strict cybersecurity requirements for these...
The fourth industrial revolution has led to a sheer amount of technologies and advantages in the form of global digitization, which is creating an expansion in business productivity, revenues, and...
IoT technologies have been with us for quite a long time, and with the passage of time and fast development of Wireless Internet and 5G, it is becoming fundamental for...
The previous few months have been a roller coaster ride for the entire security industry because of the emerging cyber-attacks targeting security organizations, researchers, and service providers. The rise of...
Often, it gets hard to understand the differences between some of the security assessments as most of the security activities complement each other at many points. With the growing and...
For quite a good time, there has been a lot of buzz around third-party data breaches. 2020 has been a year full of cyber-attacks, and the pandemic has worked as...
Many people consider bug bounties and Pentests (often referred to as Penetration Testing) as synonymous. If you’re relatively new to cybersecurity, it’s easy to confuse the two and not quite...
Category BugBounty
The fourth industrial revolution has led to a sheer amount of technologies and advantages in the form of global digitization, which is creating an expansion in business productivity, revenues, and...
Many people consider bug bounties and Pentests (often referred to as Penetration Testing) as synonymous. If you’re relatively new to cybersecurity, it’s easy to confuse the two and not quite...
Category Risk-Assessment
The fourth industrial revolution has led to a sheer amount of technologies and advantages in the form of global digitization, which is creating an expansion in business productivity, revenues, and...
IoT technologies have been with us for quite a long time, and with the passage of time and fast development of Wireless Internet and 5G, it is becoming fundamental for...
The previous few months have been a roller coaster ride for the entire security industry because of the emerging cyber-attacks targeting security organizations, researchers, and service providers. The rise of...
Often, it gets hard to understand the differences between some of the security assessments as most of the security activities complement each other at many points. With the growing and...
For quite a good time, there has been a lot of buzz around third-party data breaches. 2020 has been a year full of cyber-attacks, and the pandemic has worked as...
Category Third-Party
The fourth industrial revolution has led to a sheer amount of technologies and advantages in the form of global digitization, which is creating an expansion in business productivity, revenues, and...
For quite a good time, there has been a lot of buzz around third-party data breaches. 2020 has been a year full of cyber-attacks, and the pandemic has worked as...
Category Vulnerability-Assesssment
Often, it gets hard to understand the differences between some of the security assessments as most of the security activities complement each other at many points. With the growing and...
Category VA
The fourth industrial revolution has led to a sheer amount of technologies and advantages in the form of global digitization, which is creating an expansion in business productivity, revenues, and...
Often, it gets hard to understand the differences between some of the security assessments as most of the security activities complement each other at many points. With the growing and...
Category Compromise-Assessment
The previous few months have been a roller coaster ride for the entire security industry because of the emerging cyber-attacks targeting security organizations, researchers, and service providers. The rise of...
Category iot-security
IoT technologies have been with us for quite a long time, and with the passage of time and fast development of Wireless Internet and 5G, it is becoming fundamental for...
Category AppSec
AppSec, short for Application Security, is the practice of securing applications by identifying and addressing potential threats throughout the software development life cycle. It aims to protect applications from attacks...
With the internet revolution and application modernization, our lives have been profoundly surrounded by tons of applications, be it health care applications or enterprise and database software. Everything is making...
Category ApplicationSecurity
The fourth industrial revolution has led to a sheer amount of technologies and advantages in the form of global digitization, which is creating an expansion in business productivity, revenues, and...
With the internet revolution and application modernization, our lives have been profoundly surrounded by tons of applications, be it health care applications or enterprise and database software. Everything is making...
Category SecureSDLC
AppSec, short for Application Security, is the practice of securing applications by identifying and addressing potential threats throughout the software development life cycle. It aims to protect applications from attacks...
The fourth industrial revolution has led to a sheer amount of technologies and advantages in the form of global digitization, which is creating an expansion in business productivity, revenues, and...
With the internet revolution and application modernization, our lives have been profoundly surrounded by tons of applications, be it health care applications or enterprise and database software. Everything is making...
Category DevSecOps
AppSec, short for Application Security, is the practice of securing applications by identifying and addressing potential threats throughout the software development life cycle. It aims to protect applications from attacks...
The fourth industrial revolution has led to a sheer amount of technologies and advantages in the form of global digitization, which is creating an expansion in business productivity, revenues, and...
With the internet revolution and application modernization, our lives have been profoundly surrounded by tons of applications, be it health care applications or enterprise and database software. Everything is making...
Category Vulnerability-Assessment
The fourth industrial revolution has led to a sheer amount of technologies and advantages in the form of global digitization, which is creating an expansion in business productivity, revenues, and...
Category Compromise Assessment
The fourth industrial revolution has led to a sheer amount of technologies and advantages in the form of global digitization, which is creating an expansion in business productivity, revenues, and...
Category Cloud Security
The fourth industrial revolution has led to a sheer amount of technologies and advantages in the form of global digitization, which is creating an expansion in business productivity, revenues, and...
Category OSINT
In the previous blog post on how OSINT is used in cybersecurity, we discussed what OSINT is, who uses it, and how it helps launch a cyber attack.
The cybersecurity industry has seen massive growth in social engineering, especially phishing attacks, over the last few years. The recently published DBIR report in May 2021 has shared an 11%...
In today’s technology-driven world, information/data is one of the most significant assets to every business and industry model. It is an evenly necessary element required to make or break the...
Category osintincyber
In the previous blog post on how OSINT is used in cybersecurity, we discussed what OSINT is, who uses it, and how it helps launch a cyber attack.
The cybersecurity industry has seen massive growth in social engineering, especially phishing attacks, over the last few years. The recently published DBIR report in May 2021 has shared an 11%...
In today’s technology-driven world, information/data is one of the most significant assets to every business and industry model. It is an evenly necessary element required to make or break the...
Category opensourceintelligence
In the previous blog post on how OSINT is used in cybersecurity, we discussed what OSINT is, who uses it, and how it helps launch a cyber attack.
The cybersecurity industry has seen massive growth in social engineering, especially phishing attacks, over the last few years. The recently published DBIR report in May 2021 has shared an 11%...
In today’s technology-driven world, information/data is one of the most significant assets to every business and industry model. It is an evenly necessary element required to make or break the...
Category cloudsecurity
Prior to cloud computing, we were used to downloading and installing applications for our use. Organizations were habitual in creating their data center, hiring IT professionals, buying servers and related...
Category cloudprotection
Prior to cloud computing, we were used to downloading and installing applications for our use. Organizations were habitual in creating their data center, hiring IT professionals, buying servers and related...
Category log4j
On December 10, 2021, cyberspace got flooded with a critical vulnerability in the popular java-based logging package log4j. The vulnerability is now called Log4Shell and published as CVE-2021-44228 with a...
Category remotecodeexecution
There have been many talks lately about the recent OpenSSL vulnerabilities (CVE-2022-3602 and CVE-2022-3786). But what exactly is it, and What does this mean for you and your business? This...
Shellshock, Heartbleed and now TEXT4SHELL. The list of critical security vulnerabilities seems to be growing daily, and it can be hard to track them all. TEXT4SHELL is a vulnerability that...
On December 10, 2021, cyberspace got flooded with a critical vulnerability in the popular java-based logging package log4j. The vulnerability is now called Log4Shell and published as CVE-2021-44228 with a...
Category java
On December 10, 2021, cyberspace got flooded with a critical vulnerability in the popular java-based logging package log4j. The vulnerability is now called Log4Shell and published as CVE-2021-44228 with a...
Category vulnerability
On December 10, 2021, cyberspace got flooded with a critical vulnerability in the popular java-based logging package log4j. The vulnerability is now called Log4Shell and published as CVE-2021-44228 with a...
Category third-party
There have been many talks lately about the recent OpenSSL vulnerabilities (CVE-2022-3602 and CVE-2022-3786). But what exactly is it, and What does this mean for you and your business? This...
Shellshock, Heartbleed and now TEXT4SHELL. The list of critical security vulnerabilities seems to be growing daily, and it can be hard to track them all. TEXT4SHELL is a vulnerability that...
On December 10, 2021, cyberspace got flooded with a critical vulnerability in the popular java-based logging package log4j. The vulnerability is now called Log4Shell and published as CVE-2021-44228 with a...
Category XDR
In this era of digital technology, where technology is evolving and growing exponentially, and everything is being digitized, cyber threats and threat actors are also evolving at an alarming pace....
Category EDR
In this era of digital technology, where technology is evolving and growing exponentially, and everything is being digitized, cyber threats and threat actors are also evolving at an alarming pace....
Category Threat Detection
In this era of digital technology, where technology is evolving and growing exponentially, and everything is being digitized, cyber threats and threat actors are also evolving at an alarming pace....
Category SSDLC
We live in a data-driven world filled with multiple software and products that demand confidentiality, integrity, and availability at every cost. Those products also encompass critical functionalities and require a...
Category Security Requirements
We live in a data-driven world filled with multiple software and products that demand confidentiality, integrity, and availability at every cost. Those products also encompass critical functionalities and require a...
Category Application Security
In the ever-changing world of medical technology, cybersecurity is a major concern for medical device manufacturers. The U.S. Food and Drug Administration (FDA) has established strict cybersecurity requirements for these...
AppSec, short for Application Security, is the practice of securing applications by identifying and addressing potential threats throughout the software development life cycle. It aims to protect applications from attacks...
Are you looking to secure your data and organization while growing your operations? If so, purple teaming could be the answer. By combining red and blue teams, purple teaming is...
We live in a data-driven world filled with multiple software and products that demand confidentiality, integrity, and availability at every cost. Those products also encompass critical functionalities and require a...
Category appsec
Are you well-prepared to safeguard your applications from cyberattacks? You may have heard of methods like penetration testing, source code analysis, and vulnerability scanning. But these techniques are not enough!...
Category applicationsecurity
Are you well-prepared to safeguard your applications from cyberattacks? You may have heard of methods like penetration testing, source code analysis, and vulnerability scanning. But these techniques are not enough!...
Category securesdlc
Are you well-prepared to safeguard your applications from cyberattacks? You may have heard of methods like penetration testing, source code analysis, and vulnerability scanning. But these techniques are not enough!...
Category devsecops
Are you well-prepared to safeguard your applications from cyberattacks? You may have heard of methods like penetration testing, source code analysis, and vulnerability scanning. But these techniques are not enough!...
Category phishing
Given the ever-evolving nature of cyber threats, organizations must remain vigilant and prioritize security measures to protect their digital assets. As reported in the IBM 2022 Cost of a Data...
Category phishing-attacks
Given the ever-evolving nature of cyber threats, organizations must remain vigilant and prioritize security measures to protect their digital assets. As reported in the IBM 2022 Cost of a Data...
Category cloud-misconfiguration
Given the ever-evolving nature of cyber threats, organizations must remain vigilant and prioritize security measures to protect their digital assets. As reported in the IBM 2022 Cost of a Data...
Category compromised-credentials
Given the ever-evolving nature of cyber threats, organizations must remain vigilant and prioritize security measures to protect their digital assets. As reported in the IBM 2022 Cost of a Data...
Category purple-teaming
Are you looking to secure your data and organization while growing your operations? If so, purple teaming could be the answer. By combining red and blue teams, purple teaming is...
Given the ever-evolving nature of cyber threats, organizations must remain vigilant and prioritize security measures to protect their digital assets. As reported in the IBM 2022 Cost of a Data...
Category red-teaming
Given the ever-evolving nature of cyber threats, organizations must remain vigilant and prioritize security measures to protect their digital assets. As reported in the IBM 2022 Cost of a Data...
Category offensive-security
The security industry is full of buzzwords and phrases that often confuse newcomers. You may have encountered the term ‘Red Team vs. Blue Team,’ but understanding its meaning and relevance...
Category defensive-security
The security industry is full of buzzwords and phrases that often confuse newcomers. You may have encountered the term ‘Red Team vs. Blue Team,’ but understanding its meaning and relevance...
Category testing
Are you looking to secure your data and organization while growing your operations? If so, purple teaming could be the answer. By combining red and blue teams, purple teaming is...
Category penetesting
Are you looking to secure your data and organization while growing your operations? If so, purple teaming could be the answer. By combining red and blue teams, purple teaming is...
Category Secure Medical Devices
In the ever-changing world of medical technology, cybersecurity is a major concern for medical device manufacturers. The U.S. Food and Drug Administration (FDA) has established strict cybersecurity requirements for these...
Category Appsec
In the ever-changing world of medical technology, cybersecurity is a major concern for medical device manufacturers. The U.S. Food and Drug Administration (FDA) has established strict cybersecurity requirements for these...
Category FDA-and-Cybersecurity
In the ever-changing world of medical technology, cybersecurity is a major concern for medical device manufacturers. The U.S. Food and Drug Administration (FDA) has established strict cybersecurity requirements for these...