Nov 25, 2020
How To Find Domain Ownership in the GDPR Era

How To Find Domain Ownership in the GDPR Era ...

Learn More
Nov 22, 2020
Top 5 Critical Vulnerabilities Behind Ransomware Attacks

Top 5 Critical Vulnerabilities Behind Ransomware Attacks Cybercriminals use encrypted ransomware that has become the most common type because it is difficult to crack the encryption and remove the mal...

Learn More
Nov 15, 2020
The Age of Credential Stuffing & Account Takeover

The Age of Credential Stuffing & Account Takeover For mobile and web applications, credential stuffing attacks are considered among the top threats. While on average hackers can find matches betwe...

Learn More
Nov 12, 2020
Free Threat Intelligence Courses

Free Threat Intelligence Courses Threat intelligence is an emerging concept, recently needed in all industries, to protect companies from attacks. Gathering this intelligence should be done by a separ...

Learn More
Nov 05, 2020
OSINT for Digital Asset Discovery

OSINT for Digital Asset Discovery OSINT(Open Source Intelligence) can be used by attackers to identify assets and gather other useful information before the attack is initiated. Asset discovery takes ...

Learn More
Oct 29, 2020
The Role of Cyber Threat Intelligence Analyst

The Role of Cyber Threat Intelligence Analyst ...

Learn More
Oct 25, 2020
How To Takedown Phishing Domains for Free

How To Takedown Phishing Domains for Free ...

Learn More
Oct 22, 2020
Top Threat Intelligence Use Cases for the Insurance Industry

Top Threat Intelligence Use Cases for the Insurance Industry In the past couple of years, privacy irregularities in insurance providers have disclosed more than 100 million people’s personal pri...

Learn More
Oct 18, 2020
Top Threat Intelligence Use Cases for the E-commerce Industry-II

Top Threat Intelligence Use Cases for the E-commerce Industry-II Prevention of the landscape is no longer enough in today’s cybersecurity. All have never faced such high and concrete threats fro...

Learn More
Oct 16, 2020
Different Definitions of Threat Intelligence and Gartner’s Perspective...

Different Definitions of Threat Intelligence and Gartner’s Perspective ...

Learn More
Oct 12, 2020
Top Threat Intelligence Use Cases for the E-Commerce Industry-I

Top Threat Intelligence Use Cases for the E-Commerce Industry-I The prevention of the landscape is no longer enough in today’s cybersecurity. All have never faced such high and concrete threats from a...

Learn More
Oct 05, 2020
Top Threat Intelligence Use Cases for the Finance Sector-II

Top Threat Intelligence Use Cases for the Finance Sector-II Security departments in the financial industry are facing a daunting mission. They have to defend the company from an immense amount of indi...

Learn More
Oct 01, 2020
Using Google Dorks for Threat Intelligence Operations

Using Google Dorks for Threat Intelligence Operations Enterprises have to deal with a range of mass campaigns as well as advanced attacks that target a specific industry or company. Threat actors use ...

Learn More
Sep 28, 2020
Top Threat Intelligence Use Cases for the Finance Sector-I

Top Threat Intelligence Use Cases for the Finance Sector-I Security departments in the financial industry are facing a daunting mission. They have to defend the company from an immense amount of indis...

Learn More
Sep 25, 2020
How Web Skimming Attacks Happen & What You Can Do to Protect Yourself

How Web Skimming Attacks Happen & What You Can Do to Protect Yourself ...

Learn More
Sep 17, 2020
Using Cyber Kill Chain for Threat Intelligence

Using Cyber Kill Chain for Threat Intelligence To block the attack vector, you need to know how an attacker thinks. The same idea applies to organizations that want to prevent cybercrimes. The conseq...

Learn More
Sep 14, 2020
How Expired Digital Certificates Can Be a Nightmare?

How Expired Digital Certificates Can Be a Nightmare? The need to protect corporate data from increasing cyberattacks continues to be the top priority of every organization. One of the most important w...

Learn More
Sep 11, 2020
Why Is It Important? East-West and North-South Traffic Security

Why Is It Important? East-West and North-South Traffic Security Data centers are physical facilities designed to support your business applications, AI activities, file sharing, communications and col...

Learn More
Sep 04, 2020
An Overview of Optiv CTI Estimate 2020: Attack Tools, Techniques and P...

An Overview of Optiv CTI Estimate 2020: Attack Tools, Techniques and Procedures The term Tools, Techniques and Procedures (TTPs) refers to a method used to evaluate the cyber activity or to identify a...

Learn More
Aug 30, 2020
How to Build a SOC With Open Source Solutions?

How to Build a SOC With Open Source Solutions? The SOC is the information security department that continually tracks, analyzes, and enhances the security situation of an enterprise. The goal of the S...

Learn More