card__image

ТиХто app penetration test

Извините, этот текст доступен только на “ua”.   Ще одна історія успішного партнерства нашої компанії з командою «ТиХто» та колегами з SSG Systems. А саме в декілька етапів ми провели оцінку технічної захищеності застосунку ТиХто.   ТиХто – це мобільний додаток, який допомагає ЗСУ і територіальній обороні при перевірці осіб на предмет виявлення можливих зв’язків […]

card__image

10 worst computer viruses in history

Извините, этот текст доступен только на “en” и “ua”. It’s not a secret that computer viruses can lead to severe damages.   ‘I love You’: a computer virus caused $10 billion in damage and exposed vulnerabilities which remain 20 years on.   ILOVEYOU is considered one of the most virulent computer viruses ever created. This […]

card__image

Five Questions To Ask Your CISO About Cybersecurity Awareness Training

Извините, этот текст доступен только на “en” и “ua”.   Cybersecurity has emerged as an important issue to discuss at the senior executive and board levels. Furthermore, it is already common for boards and leadership teams to include at least one member who has some experience in this critically important area. The reason is the […]

card__image

Theft, Money Laundering, and NFT Market Manipulation: what crypto scammers do in 2022

Извините, этот текст доступен только на “en” и “ua”.   Any new technology that can offer benefits to the world has the potential to be abused by bad actors for their own personal gain.     While cryptocurrency-based crime remains an important problem to solve, especially given that the raw value of illicit transactions is […]

card__image

4 of 5 Data Breaches Caused by “Human Element,” Business Partners Involved in 3 of 5: Verizon 2022 DBIR

Извините, этот текст доступен только на “en” и “ua”.   Verizon’s annual Data Breach Investigations Report (DBIR), conducted since 2008, finds that modern data breaches can be almost entirely connected with a combination of employee mistakes and supply chain compromises; one of these elements will almost certainly be involved in any organizational cyber incident.   […]

card__image

Business executives have the weakest passwords

Извините, этот текст доступен только на “en” и “ua”.   Will we EVER learn? ‘123456’ and ‘password’ are among the most popular passwords used by CEOs – while many continue to choose names and mythical creatures, the report reveals   Researchers analysed over 290 million data breaches worldwide They grouped compromised passwords according to job […]

card__image

Canary токены: как превратить свою сеть в ловушку для злоумышленников

  Мы живем в мире, где киберугрозы есть везде, а их количество и сложность растет. С распространением технологий количество возможностей и лазеек для хакеров увеличивается. Аналитика прошлых лет подтверждает это. По оценкам аналитиков, количество кибератак в 2021 году выросло на 50% по сравнению с 2020 годом.   Одна из самых известных кибератак была осуществлена ​​на […]

card__image

Instagram hacking: why is the art world a target—and how do you get it back?

Извините, этот текст доступен только на “en” и “ua”.   As attacks on accounts surge, be careful what you click on   Hackers are attracted to accounts that enjoy a high level of engagement, such as those belonging to creatives.   According to the Identity Theft Resource Center, a US non-profit organization that helps victims […]