Anatomy of Attack # 2 – Main in the Middle
Man-in-the-middle (MITM) attacks are a common type of cybersecurity attacks that allow attackers to eavesdro...
Read more
Anatomy of Attack # 1 – Cross Site Scripting
Cross-Site Scripting (XSS) is one of the most popular attacks which uses the most popular vulnerabilities. I...
Read more
The next step to the cloud – Microsoft Dev Box – Workstation-as-a-Service
Until now, development environments were one of the key resources that relied on local applications. Due to ...
Read more
XDR Cybereason and the SOC triad – NDR
In the previous article, we discussed the shortcomings of starting the SOC triad implementation with SIEM. A...
Read more
XDR Cybereason and the SOC triad – SIEM
Organizations have had a problem with prioritizing the implementation of new technologies for a long time. S...
Read more