Uncategorized
Why protection of tips is very important not only in times of pandemic
End devices are basically all machines connected via the Internet to your network,the technical heart of your business. It is a term […]
Introducing a framework for detecting, reacting and repairing threats to Machine Learning systems
Machine learning (ML) is used in most of the technologies today, affecting almost every aspect of our lives. As Machine Learning grows […]
How vulnerabilities can be exploited and what is the purpose of vulnerability scanners?
Vulnerability mitigation is an important topic for any cybersecurity analyst. It is enough to note that the producers with the highest number […]
What is MITRE ATT&CK
In 2013, the non-profit organization MITRE introduced to the IT world the proprietary framework called ATT&CK – Adversarial Tactics, Techniques & Common […]
Heuristics in cybersecurity
It is well known that anti-malware protecting us from various malicious files – viruses, worms, Trojans, and other malware – work by […]