Trending Now
Featured news
How to Operationalize the Zero Trust Security Pillar ‘Limit Access &...
An easy way for a cyber-attacker to gain access to sensitive data is by compromising an end user’s identity and credentials. Things get even...
Tech News
Tech
DDoS attacks in Q2 2019
News overview
The second quarter of 2019 turned out to be richer than the first in terms of high-profile DDoS attacks. True, most of the...
Security
How to Protect Your Critical Assets from Malware
How to Protect Your Critical Assets from Malware #outlook a{ padding:0; }...
From E-Commerce to Enterprise Employee: How I Overcame my Fears and Doubts
By Efrat Silberhaft
One year ago, I was working as the sole designer in a small e-commerce startup. When the company shut down, I had...
The devil’s in the Rich header
In our previous blog, we detailed our findings on the attack against the Pyeongchang 2018 Winter Olympics. For this investigation, our analysts were provided...
SQL Injection Attacks: So Old, but Still So Relevant. Here’s Why (Charts)
We’re living in the Golden Age of data. Some companies analyze it to better themselves, others trade it for profit, none give it up...
Spam and phishing in Q3 2018
Quarterly highlights
Personal data in spam
We have often said that personal data is candy on a stick to fraudsters and must be kept safe (that...