News

Anatomy of Attack # 2 – Main in the Middle

Man-in-the-middle (MITM) attacks are a common type of cybersecurity attacks that allow attackers to eavesdro...
Read more

Anatomy of Attack # 1 – Cross Site Scripting

Cross-Site Scripting (XSS) is one of the most popular attacks which uses the most popular vulnerabilities. I...
Read more

The next step to the cloud – Microsoft Dev Box – Workstation-as-a-Service

Until now, development environments were one of the key resources that relied on local applications. Due to ...
Read more

XDR Cybereason and the SOC triad – NDR

In the previous article, we discussed the shortcomings of starting the SOC triad implementation with SIEM. A...
Read more

XDR Cybereason and the SOC triad – SIEM

Organizations have had a problem with prioritizing the implementation of new technologies for a long time. S...
Read more
Please be advised that our website is using cookies for marketing, statistical and functional reasons. In order to optimize the content on our website and to adapt them to your individual needs, we use informations saved using cookies on users’ end devices. Cookies can be controlled by the user through the settings of their web browser. By contiuning to use our website without changing your web browser settings, you are accepting the use of cookies.
I accept More info