Uncategorized
Short one on ROI in Cybersec – it’s about what you can show.
The clear visible desired state is a valid starting point if IT Security strategy (and every strategy to be frank). The problem […]
Alert (AA22-110A) – How to Deal with russian APT
Already at the beginning of February, the Polish Government Security Center warns services and public administration, so that they are vigilant against […]
Do you remember the times with safe internet? So… 3 times a charm of attacking WWW users.
Internet - whether for business or for personal use - is accessed by everyone. The attacks which take its source in infected website are the most popular - with spray’n’pray effect - one source, many potentially infected hosts. It doesn't matter if you own a website and want to secure it or want to secure your employees browsing the internet... It matters to know what you are up against.
Internet - whether for business or for personal use - is accessed by everyone. The attacks which take its source in infected website are the most popular - with spray’n’pray effect - one source, many potentially infected hosts. It doesn't matter if you own a website and want to secure it or want to secure your employees browsing the internet... It matters to know what you are up against. Read More
MalOps by Cybereason – Capture malicious processes, not alerts
We often repeat that the company’s “business” should not treat security departments as police – rather as a secret service-style security department. […]
IoB usage by Cybereason
IoB – Indicators of Behavior is a signal of malicious behavior, and its detection allows you to react to an ongoing or […]