card__image

ТиХто app penetration test

Извините, этот текст доступен только на “Украинский”. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language.   Ще одна історія успішного партнерства нашої компанії з командою «ТиХто» та колегами з SSG Systems. А саме в декілька етапів ми провели […]

card__image

10 worst computer viruses in history

Извините, этот текст доступен только на “Английский” и “Украинский”. For the sake of viewer convenience, the content is shown below in this site default language. You may click one of the links to switch the site language to another available language. It’s not a secret that computer viruses can lead to severe damages.   ‘I […]

card__image

Organizations Pay Multiple Ransom Demands

Извините, этот текст доступен только на “Английский” и “Украинский”. For the sake of viewer convenience, the content is shown below in this site default language. You may click one of the links to switch the site language to another available language.   80% of organizations that paid a ransom demand were hit again, nearly 50% […]

card__image

Five Questions To Ask Your CISO About Cybersecurity Awareness Training

Извините, этот текст доступен только на “Английский” и “Украинский”. For the sake of viewer convenience, the content is shown below in this site default language. You may click one of the links to switch the site language to another available language.   Cybersecurity has emerged as an important issue to discuss at the senior executive […]

card__image

Theft, Money Laundering, and NFT Market Manipulation: what crypto scammers do in 2022

Извините, этот текст доступен только на “Английский” и “Украинский”. For the sake of viewer convenience, the content is shown below in this site default language. You may click one of the links to switch the site language to another available language.   Any new technology that can offer benefits to the world has the potential […]

card__image

4 of 5 Data Breaches Caused by “Human Element,” Business Partners Involved in 3 of 5: Verizon 2022 DBIR

Извините, этот текст доступен только на “Английский” и “Украинский”. For the sake of viewer convenience, the content is shown below in this site default language. You may click one of the links to switch the site language to another available language.   Verizon’s annual Data Breach Investigations Report (DBIR), conducted since 2008, finds that modern […]

card__image

Business executives have the weakest passwords

Извините, этот текст доступен только на “Английский” и “Украинский”. For the sake of viewer convenience, the content is shown below in this site default language. You may click one of the links to switch the site language to another available language.   Will we EVER learn? ‘123456’ and ‘password’ are among the most popular passwords […]

card__image

Canary токены: как превратить свою сеть в ловушку для злоумышленников

  Мы живем в мире, где киберугрозы есть везде, а их количество и сложность растет. С распространением технологий количество возможностей и лазеек для хакеров увеличивается. Аналитика прошлых лет подтверждает это. По оценкам аналитиков, количество кибератак в 2021 году выросло на 50% по сравнению с 2020 годом.   Одна из самых известных кибератак была осуществлена ​​на […]

card__image

What’s the Difference Between a Data Leak and a Data Breach

Извините, этот текст доступен только на “Английский” и “Украинский”. For the sake of viewer convenience, the content is shown below in this site default language. You may click one of the links to switch the site language to another available language.   What’s the Difference Between a Data Leak and a Data Breach   The […]

card__image

Instagram hacking: why is the art world a target—and how do you get it back?

Извините, этот текст доступен только на “Английский” и “Украинский”. For the sake of viewer convenience, the content is shown below in this site default language. You may click one of the links to switch the site language to another available language.   As attacks on accounts surge, be careful what you click on   Hackers […]