
Why is XDR telemetry something more?
The term "telemetry" refers to data collected by specific devices - in case of our article - devices securin...
Read more

Anatomy of Attack # 2 – Main in the Middle
Man-in-the-middle (MITM) attacks are a common type of cybersecurity attacks that allow attackers to eavesdro...
Read more

Anatomy of Attack # 1 – Cross Site Scripting
Cross-Site Scripting (XSS) is one of the most popular attacks which uses the most popular vulnerabilities. I...
Read more

The next step to the cloud – Microsoft Dev Box – Workstation-as-a-Service
Until now, development environments were one of the key resources that relied on local applications. Due to ...
Read more

XDR Cybereason and the SOC triad – NDR
In the previous article, we discussed the shortcomings of starting the SOC triad implementation with SIEM. A...
Read more