• Emotet: What you need to know about Emotet malware

    In IT security circles, Emotet is one of the most notorious and prominent examples of [...]

  • What is phishing? How to recognize and protect yourself against phishing scams

    Cybercriminals use increasingly sophisticated methods to steal data and commit fraud. Yet, it's often the [...]

  • What is malware and how can you deal with it?

    While malware is one of the biggest cyber threats we deal with today, it has [...]

  • GDPR compliance: What is GDPR and how can you ensure your business is compliant?

    Implementation of the General Data Protection Regulation (GDPR) in May 2018 revolutionized how businesses in [...]

  • SolarWinds Orion Supply Chain Attack

    By Bhabesh Raj Rai, Associate Security Analytics Engineer On December 13, 2020, CISA released Emergency [...]

  • Preliminary detection of stolen FireEye red team tools

    By Bhabesh Raj Rai, Associate Security Analytics Engineer On Tuesday, December 8, FireEye disclosed that they [...]

  • Trojans: What to know about trojan viruses

    When most people think of the word “Trojan,” images of the Trojan horse come to [...]

  • What is Cyber security? Types of Threats, Importance and Benefits

    Updated Jan 2024Your home probably houses some vital possessions and heirlooms, so when you leave [...]

  • Comprehensive detection of the revamped Ryuk ransomware

    By Bhabesh Raj Rai, Associate Security Analytics Engineer First discovered in August 2018, Ryuk is [...]

  • What is a Cyber attack? Learn why cyber attacks happen and how to avoid them

    Anyone who does anything online should be aware of the risk of a cyber attack. [...]

  • What is Lateral Movement? An introductory guide and how to address it

    Originally By Friedrich von Jagwitz, Sales Engineer - Updated 30 August 2023What is Lateral Movement?Lateral [...]

  • The characteristics of top SIEM products

    Every user, device or system in a network leaves behind a virtual trail of security [...]