How to (Safely) Access the Deep Web and Darknet
How to (Safely) Access the Deep Web and Darknet You have definitely heard there is a deep side to the internet where not everyone can access it. That is considered by many as hazardous and even illega...
Tools and Features That Can Be Used To Detect Sensitive Data Leaks Fro...
Tools and Features That Can Be Used To Detect Sensitive Data Leaks From Github – Part 2 In part 1 of this blog series, we discussed a few popular osint tools that help developer’s find leaked informat...
Tools and Features That Can Be Used To Detect Sensitive Data Leaks Fro...
Tools and Features That Can Be Used To Detect Sensitive Data Leaks From Github – Part 1 Back in the time when there was no Github, developers used to share codes in local servers of the company, or ev...
Did Zoom really get hacked?
Did Zoom really get hacked? Zoom Video Communications Inc.’s video conferencing app, has seen booming popularity since COVID-19 outbreaks began in January 2020. Zoom usage rose after lockdowns with co...
20 Free Cyber Security Solutions to Help You Through the COVID-19 Pand...
20 Free Cyber Security Solutions to Help You Through the COVID-19 Pandemic With the current COVID-19 pandemic, remote working has become an inevitable option for many organizations. While enterprises...
Different Kinds of Impersonating: Phishing & Domain Squatting
Different Kinds of Impersonating: Phishing & Domain Squatting Phishing and domain squatting are commonly used by threat actors to achieve different kinds of goals against an organization. Among th...
Oops! Microsoft Lets Its SSL Certificate Expire Causing a Major Outage
Oops! Microsoft Lets Its SSL Certificate Expire Causing a Major Outage On February 3rd, Microsoft Teams suffered outages following the expiration of one of its SSL certificates. Microsoft’s collabora...
6 Benefits You Can Expect From Your Next Digital Risk Protection Solut...
6 Benefits You Can Expect From Your Next Digital Risk Protection Solution In case of a cybersecurity investment, it’s not always possible to satisfy the board by repeatedly saying “better safe than so...
First Step to Zero Trust Strategy: Gain Visibility
First Step to Zero Trust Strategy: Gain Visibility Understanding the importance of Digital Asset Monitoring (DAM) is critical. Your adversaries spend the majority of their time doing discovery and map...
Defending Against Persistent Threats
Defending Against Persistent Threats Threat actors follow a series of events-called the “cyber kill chain framework” from defense perspective-to successfully infiltrate a network and either exfiltrate...
Responding to Risks of Finance Sector
Responding to Risks of Finance Sector Financial services companies in the world witnessed a sharp rise in data breaches which shows how the sector is under attack from threat actors. For example, in t...