Jul 06, 2020
Open Source Intelligence (OSINT) 101

Open Source Intelligence (OSINT) 101 Open Source Intelligence, better known as OSINT, is a technology that refers publicly available and open sources of information (as opposed to covert or secret sou...

Learn More
Jun 30, 2020
An overview of Verizon’s 2020 Data Breach Investigation Report: A Deep...

An overview of Verizon’s 2020 Data Breach Investigation Report: A Deep Look into Attacks, Attackers and Victims For a better security posture, you need to be aware of what is going on around your indu...

Learn More
Jun 19, 2020
Types of Threat Intelligence Gathering

Types of Threat Intelligence Gathering For better security functioning, all organizations need reliable but also real-time cyber threat intelligence. Producing threat intelligence is a complex process...

Learn More
Jun 11, 2020
5 Stages of The Threat Intelligence Lifecycle

5 Stages of The Threat Intelligence Lifecycle Real-time and reliable cyber threat intelligence is essential for the security functions of organizations. It is leveraged by organizations of different s...

Learn More
Jun 03, 2020
The Difference Between Data, Information and Intelligence

The Difference Between Data, Information and Intelligence Data. Information. Intelligence. Oftentimes confused by people, these very different terms can not be used interchangeably but have a tight co...

Learn More
May 29, 2020
10 GitHub Security Best Practices

10 GitHub Security Best Practices GitHub is a standard when it comes to sharing code among developers. It is the most essential platform used by developers in every company, and despite the broad usag...

Learn More
May 20, 2020
10 Best Dark / Deep Web Browsers for Anonymity

10 Best Dark / Deep Web Browsers for Anonymity The deep web is the underground of the whole web. Accessing it is not quite difficult, but you need to follow some basic steps in order to retain your pr...

Learn More
May 17, 2020
How to (Safely) Access the Deep Web and Darknet

How to (Safely) Access the Deep Web and Darknet You have definitely heard there is a deep side to the internet where not everyone can access it. That is considered by many as hazardous and even illega...

Learn More
May 07, 2020
Tools and Features That Can Be Used To Detect Sensitive Data Leaks Fro...

Tools and Features That Can Be Used To Detect Sensitive Data Leaks From Github – Part 2 In part 1 of this blog series, we discussed a few popular osint tools that help developer’s find leaked informat...

Learn More
Apr 30, 2020
Tools and Features That Can Be Used To Detect Sensitive Data Leaks Fro...

Tools and Features That Can Be Used To Detect Sensitive Data Leaks From Github – Part 1 Back in the time when there was no Github, developers used to share codes in local servers of the company, or ev...

Learn More
Apr 15, 2020
Did Zoom really get hacked?

Did Zoom really get hacked? Zoom Video Communications Inc.’s video conferencing app, has seen booming popularity since COVID-19 outbreaks began in January 2020. Zoom usage rose after lockdowns with co...

Learn More
Apr 14, 2020
20 Free Cyber Security Solutions to Help You Through the COVID-19 Pand...

20 Free Cyber Security Solutions to Help You Through the COVID-19 Pandemic With the current COVID-19 pandemic, remote working has become an inevitable option for many organizations. While enterprises...

Learn More
Apr 10, 2020
Different Kinds of Impersonating: Phishing & Domain Squatting

Different Kinds of Impersonating: Phishing & Domain Squatting Phishing and domain squatting are commonly used by threat actors to achieve different kinds of goals against an organization. Among th...

Learn More
Feb 05, 2020
Oops! Microsoft Lets Its SSL Certificate Expire Causing a Major Outage

Oops! Microsoft Lets Its SSL Certificate Expire Causing a Major Outage On February 3rd, Microsoft Teams suffered outages following the expiration of one of its SSL certificates. Microsoft’s collabora...

Learn More
Nov 09, 2019
6 Benefits You Can Expect From Your Next Digital Risk Protection Solut...

6 Benefits You Can Expect From Your Next Digital Risk Protection Solution In case of a cybersecurity investment, it’s not always possible to satisfy the board by repeatedly saying “better safe than so...

Learn More
Oct 11, 2019
First Step to Zero Trust Strategy: Gain Visibility

First Step to Zero Trust Strategy: Gain Visibility Understanding the importance of Digital Asset Monitoring (DAM) is critical. Your adversaries spend the majority of their time doing discovery and map...

Learn More
Oct 01, 2019
Defending Against Persistent Threats

Defending Against Persistent Threats Threat actors follow a series of events-called the “cyber kill chain framework” from defense perspective-to successfully infiltrate a network and either exfiltrate...

Learn More
Sep 18, 2019
Responding to Risks of Finance Sector

Responding to Risks of Finance Sector Financial services companies in the world witnessed a sharp rise in data breaches which shows how the sector is under attack from threat actors. For example, in t...

Learn More