Blogs

Blog

10 Secure online shopping tips for the Christmas season

6. Dec 2024
Read more
Blog

Protecting Your Business from Supply-Chain Attacks: What to Do When Third Parties Are Breached

17. Oct 2024
Read more
Blog

Cybersecurity Starts at Home: A Call to IT Professionals

26. Sep 2024
Read more
Blog

Would you like to plan your day around Patch Tuesday?

26. Sep 2024
Read more
Jan Češčut Cybersecurity Analyst
Blog

Microsoft to Require MFA for Azure Portal, Entra Admin Center, and Intune Admin Center – Are You Ready?

17. Sep 2024
Read more
Blog

Urgent update Palo Alto Networks NGFW

20. Feb 2024
Read more
Blog

DFVU Data Breach: A Comprehensive Analysis and Preventive Strategies

29. Jan 2024
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

The Stealthy Cyber Threat: Abuse of GitHub for Malicious Purposes

11. Jan 2024
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

Understanding the Risks of Unprompted One-Time Passcodes in Cybersecurity

22. Dec 2023
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

How Cybercriminals Exploit Legitimate Internet Services for Malicious Purposes

2. Nov 2023
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

New Critical Vulnerability in Cisco IOS XE Software Poses Cybersecurity Concerns

18. Oct 2023
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

Enumeration Attacks: A Deep Dive into Threat Actors Generating Valid Payment Data

11. Oct 2023
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

Adversary-In-The-Middle Attack (AiTM): A novel way to evade MFA

5. Oct 2023
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

Understanding Vulnerability Lifecycle to Better Combat Exploits

21. Sep 2023
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

CL0P Group – Analysis of European’s rising ransomware threat

21. Sep 2023
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

A look into Living off the Land adversarial technique

1. Sep 2023
Read more
Jure Planinšek Head of Compliance and Legal
Blog

Diligent Management and Cybersecurity

17. Feb 2023
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

How could AI simplify malware attacks, and why is this worrying?

26. Jan 2023
Read more
Matevž Mesojednik Security Operations Center (SOC) Manager
Blog

Three Lessons for Better Cybersecurity in 2023

20. Dec 2022
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

Digital Forensics: Discovering Threat Actor’s traces using Recycle Bin

12. Dec 2022
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

Season’s Greetings from Cybercriminals

25. Nov 2022
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

Phishing as a Service (PHaaS) – an Effective Attack Vector for All Threat Actors

25. Nov 2022
Read more
Dušan Vaupotič
Dušan Vaupotič IT Manager
Blog

Remote Desktop Applications` Security

13. Nov 2022
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

New 0-day vulnerabilities in Microsoft Exchange Server actively exploited

30. Sep 2022
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

Insider Threats: What are they and how to mitigate them

20. Sep 2022
Read more
Jakob Premrn Cybersecurity Analyst
Blog

The Importance of Identity-Oriented Cybersecurity

14. Sep 2022
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

How to detect Malware Persistency (part 1)

26. Aug 2022
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

Diving Deep: Malware Injection Techniques

27. Jul 2022
Read more
Blog

SASE – Buzzword or an intelligent road to cloud security?

28. Jun 2022
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

How to detect Typosquatting?

27. Jun 2022
Read more
1 2