What is Credential Stuffing?
We hear every day of a new breach. Last one that made the news was the Collection #1 breach. This breach is precisely a collection made up of many different individual data...
We hear every day of a new breach. Last one that made the news was the Collection #1 breach. This breach is precisely a collection made up of many different individual data...
A couple of months ago, US-CERT released an article about Russian Government Cyber Activity targeting Energy and Other Critical Infrastructure Sectors. You may imagine that they exploited 0-days vulnerabilities and...
Every day we hear that a new breached occurred and millions of passwords have been stolen. For that reason, we hear recommendations from experts that we should enable two-factor-authentication (2FA). Of course, it helps, and you...
We all once received at least a phishing email. And even though almost all people heard once about what phishing is about, around 91% of cyber-attacks starts with a phishing email. Systems...
Dictionary and Brute Force attacks have been out there for a long time. The first one consists in trying different passwords from a list and check if access is granted...
Greetings everyone! Today I bring you 5 simple actions to improve the security posture of your company. The last couple of years, I've seen in different engagements that IT people struggle to take...
It was full of potential for organisations that face seasonal trading peaks, but has cloud lived up to expectations? After the seismic shift caused by cloud, the dust is settling,...
Let's face it: for all its strengths, Microsoft Office 365™, as a standalone solution, can still leave you exposed. That's why 91% of IT professionals plan to seek out additional...