Our Blog

April 5, 2021

DreamBus Botnet Infiltrating Enterprise Applications on Linux Servers

At its core, a botnet is a network of computers that have been hijacked from their users and infected with malware. The hackers can remotely control […]
April 1, 2021

4 Useful Features That Are New in Microsoft Edge

Microsoft released the newest version of its Chromium-based Edge web browser in January 2021. Learn about four useful features that Microsoft introduced in version 88 of […]
March 29, 2021

DDoS Attacks Take over Computer to Mine Cryptocurrency

Countless people have become fascinated with the current values of cryptocurrencies, like Bitcoin. With popularity comes security vulnerability and hackers looking to take advantage of unsuspecting […]
March 25, 2021

5 Tips to Make your Passwords More Secure

An organization’s infrastructure is only as secure as the passwords protecting it. Poor password practices make it easy for hackers to access sensitive information, which is […]
March 22, 2021

3 Security Threats That Will Affect Many Businesses in 2021

There are numerous security threats that companies might encounter, making it difficult to decide which ones to address first. Here are three threats that deserve attention […]
March 18, 2021

The Enforcement Phase of the Zerologon Vulnerability Fix Is Starting

Microsoft is starting the second phase of its fix for the Zerologon vulnerability. In this phase, the “domain controller enforcement mode” is automatically and permanently enabled. […]
March 1, 2021

AIR-FI – The New WiFi Hacking Method

The ubiquitous nature of Wi-Fi has certainly made our lives easier and more convenient in a lot of ways, it’s also undoubtedly made them more dangerous, […]
February 25, 2021

Extended Reality 101

Companies in a wide variety of industries are increasingly using and benefitting from extended reality (XR) technologies. Find out what these technologies are and how companies […]
February 22, 2021

US Cybersecurity Agency Discovers Long-Haul Russian Hacking Campaign

If you had to come up with some type of a “nightmare scenario” in terms of large scale, long-term cyber attacks in the United States, it […]