card__image

The Top AI Myths in Cybersecurity

  It is believed that AI should be a tool to help cybersecurity teams work to catch malicious actors. However, the annual Devo SOC Performance Report™ states there’s still work to be done.   Artificial intelligence has been (and continues to be) a popular topic of discussion in areas ranging from science fiction to cybersecurity. […]

card__image

ТиХто app penetration test

Sorry, this entry is only available in Ukrainian. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language.   Ще одна історія успішного партнерства нашої компанії з командою «ТиХто» та колегами з SSG Systems. А саме в декілька етапів ми […]

card__image

10 worst computer viruses in history

It’s not a secret that computer viruses can lead to severe damages.   ‘I love You’: a computer virus caused $10 billion in damage and exposed vulnerabilities which remain 20 years on.   ILOVEYOU is considered one of the most virulent computer viruses ever created. This virus infected computers through email and appeared as a […]

card__image

4 of 5 Data Breaches Caused by “Human Element,” Business Partners Involved in 3 of 5: Verizon 2022 DBIR

  Verizon’s annual Data Breach Investigations Report (DBIR), conducted since 2008, finds that modern data breaches can be almost entirely connected with a combination of employee mistakes and supply chain compromises; one of these elements will almost certainly be involved in any organizational cyber incident.   82% of data breaches logged in 2021 involved a […]

card__image

Business executives have the weakest passwords

  Will we EVER learn? ‘123456’ and ‘password’ are among the most popular passwords used by CEOs – while many continue to choose names and mythical creatures, the report reveals   Researchers analysed over 290 million data breaches worldwide They grouped compromised passwords according to job title and industry Among CEOs, ‘123456’, ‘password’, ‘12345’ and […]