Today's Threat Landscape

Continuous Security Testing is a Must in Today's Threat Landscape

According to studies, approximately 60% of firms that experience a data breach…


PowerPoint Malware

Hackers Infect Systems with PowerPoint Malware Using Mouseover Trick.

PowerPoint Malware APT28 (aka Fancy Bear), a Russian state-sponsored threat…


Incident Response Practices

7 Best Incident Response Practices Your Company Should Consider

With these seven critical Incident Response Practices, you can ensure that…


Network Security Threats

5 Network Security Threats and How to Protect Your Business

Cyber security is essential today because everyone relies on technology, from…


Data Breaches

Top 5 Reasons Why Data Breaches Happen

Data Breaches can be catastrophic for many firms. The compromise of sensitive…


BYOD

7 Point Checklist for Securing BYOD

Bring-your-own-device BYOD is the practice of allowing employees to access…


pen testing methodologies

Top 5 Pen testing methodologies

Hidden vulnerabilities in a company’s computer networks, systems, and…


Uber Completely Pwned By Teenager

Uber Completely Pwned By Teenager - Sources Reveal

Uber Completely Pwned By Teenager | “I announce I am a hacker, and Uber…


Testimony of Peiter Zatko

Senators Enraged by the Testimony of Peiter Zatko, Twitter's Whistleblower

Testimony of Peiter Zatko regarding the social media site have made it even…


Microsoft's Most Recent Security Update

Microsoft's Most Recent Security Update Fixes a Zero-Day and 64 New Flaws

Microsoft’s Most Recent Security Update released patches on Tuesday to…