Menu
Solutions
Back
Solutions
Data Center and Cloud
Read more
Business Continuity
Read more
Data Center Automation and Management
Read more
Private Cloud Design and Data Center Transformation
Read more
Public and Hybrid Cloud
Read more
Networking
Read more
Building and Deploying NetDevOps Environments and Processes
Read more
Core/Edge Network Optimization
Read more
Data Center, Cloud Networking and SDN
Read more
IPv4 / IPv6 and Ethernet Architecture
Read more
Network Function Virtualization
Read more
Network Migration for Service Providers
Read more
Network Service Orchestration
Read more
Optical Transport
Read more
SD-WAN Design and Deployment Services
Read more
Secure SD-WAN as a Service
Read more
IT Security
Read more
Advanced Malware Protection (AMP)
Read more
Cloud Security
Read more
Incident Response
Read more
Industrial Cyber Defense and Protection
Read more
Network Infrastructure and Security Audit
Read more
Risk and Security Assessment
Read more
Managed Security Operations Center (SOC) Services
Read more
Secure and Compliant Collaboration
Read more
Secure Mobility
Read more
Security Operations Center (SOC) Building Services
Read more
Zero Trust Architecture
Read more
Workspace
Read more
Contact Center in the Cloud
Read more
Desktop and Application Virtualization
Read more
Enterprise Collaboration
Read more
Enterprise Mobility
Read more
Hybrid Cloud Collaboration Migration and Deployment
Read more
Interconnecting Collaboration Tools and Platforms
Read more
IT-as-a-Service
Read more
Services
Back
Services
Cybersecurity Maturity Assessment
Read more
Consulting
Read more
Content Development
Read more
Education
Read more
Implementation
Read more
Project Scoping
Read more
Support and Operations
Read more
System Design
Read more
Knowledge
Back
Knowledge
Blogs
Read more
Success Stories
Read more
Videos
Read more
Whitepapers
Read more
Latest Video
Cisco Cyber Vision in Action: How to Secure Your OT Network
Learn how you can use Cisco Cyber Vision to improve the security of your OT…
Read more
Events
Careers
About
Back
About
About NIL
Read more
Company
Read more
Leadership
Read more
Sustainability and social responsibility
Read more
Press
Read more
Latest News
NIL Achieves Elite Status in the Splunk Partnerverse Program
The Splunk Elite status achievement reinforces NIL’s dedication to excellence in data analytics and security.
Read more
NIL Learning
NIL Learning
Search for:
Select your local Conscia office:
Go to
Global
Global/English
Denmark/Danish
Germany/German
Netherlands/Dutch
Norway/Norwegian
Sweden/Swedish
UK/English
Go to
Global/English
Denmark/Danish
Germany/German
Netherlands/Dutch
Norway/Norwegian
Sweden/Swedish
UK/English
Search for:
Search
NIL Learning
NIL Learning
Contact
Blogs
Home
»
Blogs
Show all
Success Stories
Events
Blogs
Videos
News
Press releases
Whitepapers
Blog
10 Secure online shopping tips for the Christmas season
6. Dec 2024
The holiday season is upon us, and alongside the magic of Christmas comes the pressure of secure online shopping for presents for your loved ones. The holiday season is a...
Read more
Blog
Protecting Your Business from Supply-Chain Attacks: What to Do When Third Parties Are Breached
17. Oct 2024
In today’s interconnected digital ecosystem, businesses rely heavily on third-party vendors for various tools, technologies, and services. While...
Read more
Blog
Cybersecurity Starts at Home: A Call to IT Professionals
26. Sep 2024
As IT professionals, we are responsible for ensuring that our family, friends, and neighbors don’t become victims of...
Read more
Blog
Would you like to plan your day around Patch Tuesday?
26. Sep 2024
I’ve trimmed my hedge three times this year. That’s not something I usually do. Typically, I have a...
Read more
Jan Češčut
Cybersecurity Analyst
Blog
Microsoft to Require MFA for Azure Portal, Entra Admin Center, and Intune Admin Center – Are You Ready?
17. Sep 2024
Starting October 15, 2024, Microsoft will require Multi-Factor Authentication (MFA) for all sign-ins to Azure Portal, Microsoft Entra...
Read more
Blog
Urgent update Palo Alto Networks NGFW
20. Feb 2024
Palo Alto Networks are currently facing an expiration issue with a Palo Alto Networks certificate expiration on April...
Read more
Blog
DFVU Data Breach: A Comprehensive Analysis and Preventive Strategies
29. Jan 2024
In a significant cybersecurity incident, Slovenian retailer DFVU, which operates brands such as S-mania, Layoners, Mazzaci, and RedLynx,...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
The Stealthy Cyber Threat: Abuse of GitHub for Malicious Purposes
11. Jan 2024
In the evolving landscape of cybersecurity threats, GitHub, a popular collaborative coding and version control platform, has emerged...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Understanding the Risks of Unprompted One-Time Passcodes in Cybersecurity
22. Dec 2023
In the dynamic world of cybersecurity, understanding the implications of receiving an unprompted one-time passcode (OTP) is crucial. This occurrence...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
How Cybercriminals Exploit Legitimate Internet Services for Malicious Purposes
2. Nov 2023
Cybercriminals increasingly manipulate reputable platforms such as Google Drive, OneDrive, Notion, and GitHub to camouflage their malicious activities...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
New Critical Vulnerability in Cisco IOS XE Software Poses Cybersecurity Concerns
18. Oct 2023
CVE-2023-20198 vulnerability affects physical and virtual devices running Cisco IOS XE software with the HTTP or HTTPS Server...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Enumeration Attacks: A Deep Dive into Threat Actors Generating Valid Payment Data
11. Oct 2023
Enumeration attacks, especially banking identification number (BIN) generation attacks, enable threat actors to produce and validate payment card numbers. These...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Adversary-In-The-Middle Attack (AiTM): A novel way to evade MFA
5. Oct 2023
In the vast realm of cyber threats, a relatively newer but impactful method has emerged: Adversary In the...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Understanding Vulnerability Lifecycle to Better Combat Exploits
21. Sep 2023
If you care about cybersecurity, you surely have heard the term ‘software vulnerability.’ But it can quickly happen...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
CL0P Group – Analysis of European’s rising ransomware threat
21. Sep 2023
If you were following trends in the cyber threat landscape for the past few months, or actually the...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
A look into Living off the Land adversarial technique
1. Sep 2023
Recently, you may have noticed several cybersecurity news sites citing Microsoft’s article on Flax Typhoon’s (threat actors) stealthiness while performing...
Read more
Jure Planinšek
Head of Compliance and Legal
Blog
Diligent Management and Cybersecurity
17. Feb 2023
Leadership should be familiar with and understand cyber risks and their management, even though they may not have...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
How could AI simplify malware attacks, and why is this worrying?
26. Jan 2023
AI can simplify malware attacks, lowering costs, giving cybercriminals an advantage over insufficiently secured targets.
Read more
Matevž Mesojednik
Security Operations Center (SOC) Manager
Blog
Three Lessons for Better Cybersecurity in 2023
20. Dec 2022
From the point of view of Conscia's Security Operations Center (SOC), 2022 confirmed the fact that managing cyber...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Digital Forensics: Discovering Threat Actor’s traces using Recycle Bin
12. Dec 2022
Criminals don't like to leave traces. In the cyber world, that means deleting their malicious software from your...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Season’s Greetings from Cybercriminals
25. Nov 2022
Cybercrime is on the rise during the holiday season. Cybercriminals take advantage of Black Friday, Cyber Monday, and...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Phishing as a Service (PHaaS) – an Effective Attack Vector for All Threat Actors
25. Nov 2022
Phishing has professionalized. It is literally available to criminals in a »as a service« model, and the most...
Read more
Dušan Vaupotič
IT Manager
Blog
Remote Desktop Applications` Security
13. Nov 2022
Remote Desktop Applications (RDA) usage is growing and with that the importance of keeping them secure. Learn about...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
New 0-day vulnerabilities in Microsoft Exchange Server actively exploited
30. Sep 2022
Two reported 0-day vulnerabilities affecting Microsoft Exchange Server 2013, 2016, and 2019 (on-prem) tracked as CVE-2022-41040 and CVE-2022-41082...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Insider Threats: What are they and how to mitigate them
20. Sep 2022
Organizations' own personnel pose one of the biggest threats to their security. Read the article to learn how...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
The Importance of Identity-Oriented Cybersecurity
14. Sep 2022
Why should you re-focus your cyber defense from on-premises security to identity-oriented security? Read the article and learn...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
How to detect Malware Persistency (part 1)
26. Aug 2022
Malware persistency is a mechanism adversaries use to ensure foothold in a breached environment. Read the article to...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Diving Deep: Malware Injection Techniques
27. Jul 2022
Malware Injection Techniques This is the first entry in the Malware Injection Techniques article series that we will be writing...
Read more
Blog
SASE – Buzzword or an intelligent road to cloud security?
28. Jun 2022
Secure Access Service Edge (SASE) All about what SASE (Secure Access Service Edge) is and how it can...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
How to detect Typosquatting?
27. Jun 2022
Typosquatting is a type of social engineering attack, where a threat actor registers domains with deliberately misspelled names...
Read more
1
2
»