Uncategorized
Anatomy of Attack # 2 – Main in the Middle
Man-in-the-middle (MITM) attacks are a common type of cybersecurity attacks that allow attackers to eavesdrop on communications between two targets. MITM attacks […]
Anatomy of Attack # 1 – Cross Site Scripting
Cross-Site Scripting (XSS) is one of the most popular attacks which uses the most popular vulnerabilities. It is considered one of the […]
The next step to the cloud – Microsoft Dev Box – Workstation-as-a-Service
Until now, development environments were one of the key resources that relied on local applications. Due to the computing and hardware needs […]
XDR Cybereason and the SOC triad – NDR
In the previous article, we discussed the shortcomings of starting the SOC triad implementation with SIEM. As a reminder – SIEM is […]
XDR Cybereason and the SOC triad – SIEM
Organizations have had a problem with prioritizing the implementation of new technologies for a long time. Since the pandemic, the catalyst for […]