- All Categories
- Anti-phishing
- Anti-phishing solution
- CISO
- compromised
- Covid-19
- Cybercrime
- cybersecurity
- Darkweb
- Data Breach
- DKIM
- DMARC
- domain
- Domain name monitoring
- EASM
- Email spam
- hotlinking
- Impersonation
- Infographic
- keylogging
- Log4j
- Malware
- Online fraud
- OWASP Top 10
- Password
- Penetration Testing
- Pharming
- Phishing
- Phishing email
- phishing scam
- Phishing website
- RBI
- Research
- security
- security awareness
- Smishing
- Social Engineering
- Social Media
- Social Media Monitoring
- spear phishing
- SPF
- spoofing
- Takedown
- trojan
- Uncategorized
- Virus
- Vulnerability Assessment
- Weekly roundup
Understanding Critical Threat Vectors 2023
In the ever-evolving landscape of cybersecurity, one term that often arises is ‘threat vector.’ But what does it mean, and why should […]
Do you know how they hacked your account? Part five: Keylogging
Keylogging (also called keystroke logging) is a method that cyber criminals use to record (or log) the keys you strike on your […]
Do you know how they hacked your account? Part four: Viruses
In this part we will highlight some of the well-known types of computer viruses Trojan A Trojan horse (commonly known as a […]
4 Tips to secure yourself against being hacked
Following to our article ‘Do you know how they hacked your account? ‘, we are spotting easy to apply tips to save […]
Appointments on hold after Malware attack targeting Hospitals systems
Cyber attacks on hospitals have emerged as a significant cyber security risk in 2016, probably because hospitals have proven to be easy […]
Do you know how they hacked your account? Part one: Downloading the infection
A cyber-attack is classified as any type of offensive action used by cyber criminals to deploy malicious code in your system with […]
How you get infected by malware?
Malware (short for malicious software) is one of the terms you’ll hear most often when it comes to cyber security threats. The […]
What is Emotet? What makes it so dangerous?
Emotet was first discovered by security researchers in 2014. Emotet is a generic form of malware that is mostly used as a […]
Importance of Strong passwords in Today’s world !
Passwords are the first line of defense against unauthorized devices or accounts entry. You may be open to hackers frequently using the […]