How to conduct a security risk assessment

The pandemic provided threat actors with numerous new opportunities to try to infiltrate corporate networks and cloud systems. Businesses had to quickly bring new systems online to support their remote employees as more employees moved to remote working arrangements. The size of attack surfaces grew rapidly, and companies struggled to keep up due to a […]
9 cybersecurity tips to improve your business

We live in an age where we are connected and available all the time. With the rise of smartphones, tablets, and laptops, many of us are using the internet to keep in touch with friends, family and work. However, no matter how connected we think we are, we are not completely safe. Cybercriminals have had […]
Be careful! Hackers have a new way to steal your Microsoft 365 credentials

This new age of cybercriminals have generated new creative ways to attack against Microsoft 365 users. They have started using Static Web Apps, an Azure service, in their quest to do so. Static Web Apps have two features that are easily abused, according to MalwareHunterTeam researchers: custom branding for web apps and web hosting for […]
The digital war between Russia and Ukraine

The conflict in Ukraine and Russia continues with both countries wanting to win. Ukraine wants to regain control of their country, and Russia wants to maintain its dominance over neighboring countries. But what happens when the war extends beyond the field? The ruling parties in both countries are trying to gain more internet control over […]
The 12 most in demand jobs this 2022

As the market and its needs change, so do job openings. This is how we see the most in-demand jobs become a race for who possesses the most sought-after skills according to the trends. But what are the most in-demand jobs in 2022? Do you possess any of these skills? Millennials and generation Z are […]
5 ways to protect your business from cyberattacks

Insecurity has never been more common. In fact, it is weaknesses in Internet security which has resulted in so many cyberattacks, such as the NHS WannaCry virus and the Sony hackers. Cybersecurity is because of that. Because people have been used to use the internet casually, they have become accustomed to not being overly concerned […]
Oh! You have a data breach. Do your backups really work?
What to do if you have a data breach? You better check on your data backup before taking any decision. Governments advise ransomware victims not to pay criminals in order to regain access to their data. However, an experienced digital forensics and incident response expert concedes that there are situations when giving in is justified. […]
The cloud security test that unveils a shocking result
The insecure cloud computing services can be a huge risk for companies because they are a regular goal for cyber criminals. Researchers have demonstrated how vulnerable or poorly configured cloud services can be, after deploying hundreds of honeypots designed like an unsecured infrastructure, some of which seem compromised by hackers in only a few minutes. […]
What is the difference between day-to-day IT and Cyber Security?
While cybersecurity and information technology are certainly similar, they are not the same. Information technology (IT) is about applying new technologies to help an organization grow. This includes things like improving network performance, improving communications and facilitating information sharing. In information technology, there is IT security, which is the creation and implementation of systems and […]
Apple sues NSO Group for assault iPhones with Pegasus spyware
Currently Apple has followed WhatsApp and its parent company Meta (formerly called Facebook) in suing Pegasus spyware maker NSO Group. Aside from the promising new data on how NSO Group infected targeted iPhones via a zero-click exploit that researchers later dubbed ForcedEntry, Apple says it’s “seeking a injunction to ban NSO Group from using any […]