What is Zero Trust Security Model?
Zero Trust Security is one of the technology trends with the form of a security architecture model that is starting to be used by many companies to strengthen their infrastructure.Read More →
Zero Trust Security is one of the technology trends with the form of a security architecture model that is starting to be used by many companies to strengthen their infrastructure.Read More →
Previously undetected malware called Lightning Framework that targets Linux systems can be used as a backdoor using SSH and deploy rootkits to cover the tracks of attackers. Described as aRead More →
One of the attack methods that hackers can use is a simple Word document that they send in the mail. They use macros that are capable of executing the maliciousRead More →
SonicWall has published a hotpatch to fix two SQL injection vulnerabilities impacting the GMS (Global Management System) and Analytics On-Prem products. CVE-2022-22280 is a critical vulnerability (CVSS 9.4) that resultsRead More →
Searching vulnerabilities on the host (the host can be a website, web server, network device (router and others), end-user computer) begins with the collection of basic information. This information includesRead More →
Sensitive data is inherent to SAP solutions. Data must be protected against external unauthorized access, thus meaning extensive security and protection monitoring is required. Because SAP Systems have a holisticRead More →
Microsoft revealed on Tuesday that a large-scale phishing campaign targeted more than 10,000 organizations since September 2021 by attacking the Office 365 authentication process even on accounts secured with multi-factorRead More →
Cyber Security researchers at the Department of Software and Information Systems Engineering, Ben-Gurion University of the Negev, Israel, have discovered a new technique called “SATAn”. The new method allows stealingRead More →
A few days ago Spain police sighted a new type of scam that has been called Reverse QR Scam. A fraudulent technique with which scammers steal money through this codeRead More →
We can say that the Tor browser is one of the most used when it comes to maintaining anonymity and privacy. It is in fact the one used to accessRead More →