Podcast 26/10/2023 EP25: Key Takeaways from our Ransomware Survey In today's digital landscape, ransomware threats have become an increasingly significant concern for organizations of… Read More
Security information 24/10/2023 Detecting and Preventing Password Spraying Attacks Passwords are common ways of logging into the system, service, or application. They are typically… Read More
Security information 20/10/2023 Understanding the Adversary-in-the-Middle Attack – How It Works and How to Defend Against It An adversary-in-the-middle attack (formerly Man-in-the-middle, sometimes now referred to as Attacker-in-the-middle) is a type of… Read More
Podcast 18/10/2023 EP24: The Danger of Malicious OAuth Apps in M365 Malicious OAuth apps are an issue that has plagued M365 for many years. By default,… Read More
Security information 16/10/2023 Mastering and Leveraging the MITRE ATT&CK Framework on Cyber Threat Detection The requirement to track and catalog typical TTPs (Tactics, Techniques, and Procedures) that APT (Advanced… Read More
The Top 5 Spear Phishing Examples and Their Psychological Triggers Security information 18/08/2023 Read more
Monthly Threat Report October 2023 Threat Reports 06/10/2023 This month's report highlights high email threats, increased targeting of the Entertainment and Mining industries,… Read more