422 posts
- Tips and Best Practices
- Threat Prevention
- Social Media
- Our Products
- News and latest trends
- IOT
- Digital Education
- Artificial Intelligence
Threat Prevention
What is Threat Hunting and why is it necessary?
Companies are increasingly aware of the importance of creating detection and hunting capacities that help to keep their business’s future from being put at risk.…
Marketers develop a new sneaky tracking technique
Digital marketers are desperate to know everything they can about you – and they’re tracking your phone to do it.
The boom of fileless malware attacks: How can we fight it?
Fileless malware is when the malware in question doesn’t get onto our computers through a specific document, but rather is installed within the RAM.
Online ads: a potential way in for XSS attacks
Find out how some of the online ads we see most often day to day can end up becoming a real cybersecurity problem and a lure for cybercrime.
From the year of ransomware to the year of cryptojacking
This year there has been a 4,000% increase in the number of cryptojacking attacks, the favourite new trend among cybercriminals.
SIM Hijacking Explained
What is SIM hijacking and how do they do it? SIM swapping is essentially the process of hackers activating your number onto a SIM card of their possession.
Security risks curb the adoption of online banking
A recent study reveals that 77% of those surveyed have been victims of the famous BEC scam or the CEO fraud, increasing insecurity in online banking.