Our Blogs
Tackling Non-Human Identities: Mario Duarte Joins Aembit as CISO
Aembit, the AI-powered identity management firm, has today introduced the appointment of Mario Duarte as the chief information security officer...
Beware of Phantom Domains: How Hijackable Hyperlinks Could Compromise Your Security
As mentioned in a recently published article at the 2024 Web Conference, what are known as "phantom domains" enable malicious individuals to seize...
Unmasking a Key Member of the Evil Corp Affiliate: LockBit Revealed
Authorities have identified Aleksandr Viktorovich Ryzhenkov, a Russian national, as a significant figure within the infamous Evil Corp cybercrime...
Uncovering the Dangers of the Nitrogen Malware: A Closer Look at its IP Scanning Capability with Sliver and Cobalt Strike on Compromised Servers
Silver and Cobalt Strike are advanced adversary simulation tools that see widespread usage in penetration testing and red team operations. These...
“Cyber Security Weekly Update: Data Breaches, Vulnerabilities, and Cyber Attacks”
Welcome to the latest release of the Cybersecurity Newsletter, bringing you fresh updates and perspectives from the realm of cybersecurity. Stay...
The Vulnerability of Google Workspace’s Gemini to Prompt Injection Attacks
An recent examination has unveiled that Google’s Gemini for Workspace, a adaptable AI aide integrated across various Google products, is prone to...
The Future of Access Control: Mobile Technology Leading the Way
During the previous year, the largest amount of cyber intrusions (30%) initiated in a similar manner: a cyber perpetrator utilizing legitimate...
Strengthening Password Security: NIST’s Latest Recommendations
The National Institute of Standards and Technology (NIST) has published fresh guidelines for password protection, signaling a notable departure from...
Predicting Healthcare Industry Cyberattacks in 2024
As per the IBM Cost of a Data Breach Report 2024, the worldwide average expense of a data breach hit $4.88 million this year, marking a 10% surge...
Mitigating Cyber Attacks: A Comprehensive Guide on Active Directory Security by CISA
With the objective of boosting cybersecurity measures, the Cybersecurity and Infrastructure Security Agency (CISA), together with various...
Discover security vulnerabilities on your web applications and networks