Podcast 26 October 2023 EP25: Key Takeaways from our Ransomware Survey In today's digital landscape, ransomware threats have become an increasingly significant concern for organizations of… Read More
Security information 24 October 2023 Detecting and Preventing Password Spraying Attacks Passwords are common ways of logging into the system, service, or application. They are typically… Read More
Security information 20 October 2023 Understanding the Adversary-in-the-Middle Attack – How It Works and How to Defend Against It An adversary-in-the-middle attack (formerly Man-in-the-middle, sometimes now referred to as Attacker-in-the-middle) is a type of… Read More
Podcast 18 October 2023 EP24: The Danger of Malicious OAuth Apps in M365 Malicious OAuth apps are an issue that has plagued M365 for many years. By default,… Read More
Security information 16 October 2023 Mastering and Leveraging the MITRE ATT&CK Framework on Cyber Threat Detection The requirement to track and catalog typical TTPs (Tactics, Techniques, and Procedures) that APT (Advanced… Read More
Press Releases 10 October 2023 Almost 60% of businesses are ‘very’ to ‘extremely’ concerned about ransomware attacks – Hornetsecurity annual ransomware survey Nearly 60% of companies are ‘very’ to ‘extremely’ concerned about ransomware attacks, according to latest… Read More
Monthly Threat Report February 2024: A Month for Breaches and Ransomware Threat Reports 14 February 2024 This month, we've witnessed a decline in low-effort high-volume email attacks, but a rise in… Read more
EP05: What is Immutability and Why Do Ransomware Gangs Hate it? Podcast 16 May 2023 In today’s episode, we welcome , an esteemed expert in immutability and backups at .… Read more
IT Pro Tuesday #318 IT Pro Tuesday 09 September 2024 DANE Validator, Certificate Tutorial, Link Checker & More Read more