We constantly hear phrases like ‘data is the new oil’ — and just like oil it needs to be stored carefully. According to research commissioned by Arcserve, 52% of mid-sized companies that have experienced data loss in the last five years could not recover all their data and the average loss they suffered ranged from […]
Explore a wide range of compelling topics in the field of cybersecurity with our General Blog category. Stay informed and gain valuable insights into the dynamic world of vulnerability management, cybersecurity best practices, and emerging trends.
Our General Blog category delves into various aspects of the IT world, offering informative articles, expert analysis, and practical tips to help you navigate the ever-evolving threat landscape. From discussing the latest industry challenges to exploring innovative solutions, we cover it all.
Discover the importance of vulnerability management and learn how to effectively identify, prioritize, and remediate vulnerabilities within your organization. Our blog articles provide actionable advice and strategies to enhance your cybersecurity posture and mitigate potential risks.
Stay up-to-date with the latest developments in the industry, including emerging threats, regulatory changes, and technological advancements.
In today’s increasingly digital world, security threats are becoming more and more sophisticated. One such threat that can cause serious harm to individuals and businesses alike is a zero-day vulnerability. In this article, we’ll explore what zero-day vulnerabilities are, the dangers they pose, and how they can be avoided. Definition of a Zero-Day Vulnerability A
To effectively shield your organization from cyber attacks, it’s vital to understand cyber attack vectors. After all, how do you know what you should be doing to defend, if you don’t have an idea of the threats? But what are cyber attack vectors? ‘Vectors’ are methods or pathways exploited by hackers to access computer systems,
Explore internet-facing asset discovery to protect your business by identifying and securing exposed online assets. Ransomware, state-directed cybercriminals and the dark web gangs — in today’s world, it’s crucial for companies to safeguard their assets from cyber threats. Ensuring the security of these resources is vital, but it becomes challenging with the increasing adoption of
We must be able to trust payment systems: Payment terminals have conquered nearly every retail outlet and payment cards are as pervasive as cash. Major parts of this critical payment infrastructure, however, rely on proprietary protocols …
Learn how a team at SRLabs optimized a vulnerability in the development software Telerik UI from 2017 to create a practical exploit. The research details the optimization techniques deployed, which can also be used for developing other exploits.
Banks are known for their strong security efforts and better-than-average protection from hacking. As we discussed previously when introducing a metric to compare the Hackability of different organizations, banks are among the top three …
Travel bookings worldwide are maintained in a handful of systems. The three largest Global Distributed Systems (GDS) Amadeus, Sabre, and Travelport administer more than 90% of flight reservations as well as numerous …
Most remote video cameras are not exposed directly to the internet. However, insecure cloud services put them at a similar risk of becoming part of the next IoT camera botnet.
This blog shows how the status quo bias – the human tendency to prefer the current situation – complicates our private and professional lives. We cope with suboptimal decisions instead of embracing beauty, challenge, and change. Companies make choices that are not in their best interest based on the vague “cloud is insecure” feeling that nourishes the status quo bias all too well. As a solution, let us look at the situation through a cybersecurity lens. There is much to analyze but just one vital must-do for organizations: make the right choice.