Security

OSINT – Using Threat Intelligence to Secure Your Organization
- By admin
- . May 3, 2020
In my first article on Cyber Security Threat Intelligence Analysts, (CTI analysts) we covered what a CTI analyst is and discussed how they can bridge

Darker Side of Malicious Bots-What kind of damage can malicious bots cause?
- By admin
- . May 3, 2020
Recently a report published by Radware reveals that nearly 58% of the malicious bots traced in February 2020 by various IT security platforms mimic human

Zero Trust, SASE – Digital Enablers or Adding Complexity to Cyber Ecosystems
- By admin
- . May 2, 2020
Given the title of this article I suspect you are reading this because you have been in a recent situation where you have been asked

How Scammers Impersonate Your Carrier in Texts
- By admin
- . May 2, 2020
Back when digital scams were new, they used to impersonate the position of someone in power. Whether it was a wealthy prince from another country

What to do when you receive an extortion email from Malwarebytes Labs
- By admin
- . May 2, 2020
Extortion emails are nothing new, but with the recent increase in frequency, many people are looking for guidance. If you have received such a message