IoT adoption is expanding across all industries, but there are several risks associated with IoT. In this article we explain how to mitigate risks and protect businesses from cyberattacks exploiting these new vulnerabilities.
Read moreIn this article, we will take a look at the current state of cyberwarfare in areas where it is most prevalent, and discuss whether we have seen the technological advancement that was theorised.
Read moreThe evolution of banking droppers poses a serious threat to Android users’ financial privacy, as cybercriminals are able to constantly develop new tactics to bypass security measures and steal victims’ banking data. Starting from two notorious malware like Xenomorph and Sharkbot, this article explores the recent developments of this cyber phenomenon, providing essential tips for prevention and remediation.
Read moreBlackCat is considered to be one of the most dangerous and sophisticated ransomware groups. Since their first appearance in 2021, they’ve been able to carry out attacks against high-profile organisations. However, a recent, suspicious incident involving a large ransom payment has cast a shadow on their future.
Read moreIn recent months, stealer logs have emerged as a new threat spreading across dark web. Through an exploration of parsed and unparsed logs, this article unveils the motivations driving their widespread sharing and provides practicable steps to protect yourself from becoming a victim.
Read moreCyber-attacks in 2023: 45% increase in data theft on the dark web. Over 7.5 billion pieces of information circulating on the dark web at a global level, with a 15.9% increase in reports. The techniques used by cybercriminals are becoming increasingly sophisticated: with the malicious use of artificial intelligence, it is getting harder and harder to distinguish between genuine and bogus communications.
Read moreAdvertising permeates every online interaction in our digital society. This ubiquitous presence has led to a new cyber threat, malvertising, which attempts to inject malicious code into digital ads, often distributed by legitimate advertising networks, making it more challenging to detect.
Read moreAPIs play a key role in our fast-paced digital landscape as they are incredibly useful to facilitate interactions between software communications. At the same time, they harbor many vulnerabilities that can compromise security. This article explores the most common ones and their potential consequences.
Read morePlease fill in the form below (fields with * are mandatory) and we will respond to your request as soon as possible!