Blogs

David Kasabji Principal Threat Intelligence Engineer
Blog

CL0P Group – Analysis of European’s rising ransomware threat

21. Sep 2023
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

A look into Living off the Land adversarial technique

1. Sep 2023
Read more
Jure Planinšek Head of Compliance and Legal
Blog

Diligent Management and Cybersecurity

17. Feb 2023
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

How could AI simplify malware attacks, and why is this worrying?

26. Jan 2023
Read more
Matevž Mesojednik Security Operations Center (SOC) Manager
Blog

Three Lessons for Better Cybersecurity in 2023

20. Dec 2022
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

Digital Forensics: Discovering Threat Actor’s traces using Recycle Bin

12. Dec 2022
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

Season’s Greetings from Cybercriminals

25. Nov 2022
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

Phishing as a Service (PHaaS) – an Effective Attack Vector for All Threat Actors

25. Nov 2022
Read more
Dušan Vaupotič
Dušan Vaupotič IT Manager
Blog

Remote Desktop Applications` Security

13. Nov 2022
Read more
Blog

Security of Remote Desktop Applications

21. Oct 2022
Read more
Jakob Premrn Cybersecurity Analyst
Blog

The Importance of Identity-Oriented Cybersecurity

21. Oct 2022
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

New 0-day vulnerabilities in Microsoft Exchange Server actively exploited

30. Sep 2022
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

Insider Threats: What are they and how to mitigate them

20. Sep 2022
Read more
Jakob Premrn Cybersecurity Analyst
Blog

The Importance of Identity-Oriented Cybersecurity

14. Sep 2022
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

How to detect Malware Persistency (part 1)

26. Aug 2022
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

Diving Deep: Malware Injection Techniques

27. Jul 2022
Read more
Blog

SASE – Buzzword or an intelligent road to cloud security?

28. Jun 2022
Read more
David Kasabji Principal Threat Intelligence Engineer
Blog

How to detect Typosquatting?

27. Jun 2022
Read more
Tom Kern Cyber Security Analyst
David Kasabji Principal Threat Intelligence Engineer
Blog

How to detect Follina the Windows MSDT 0-day

2. Jun 2022
Read more
Stojan Rančić IT Security Architect
Blog

Cybersecurity Is in the Hands of Managers

30. May 2022
Read more
Blog

Solving the Collaboration Tools Interoperability Challenge with Webex Rooms

23. May 2022
Read more
Katarina Primožič Ramoveš People and culture officer
Blog

Sustainable Business Strategies: Responsibility and Opportunity of the HR

20. Mar 2022
Read more
Jakob Premrn Cybersecurity Analyst
Blog

Visit of a Security Operations Center (SOC)

28. Feb 2022
Read more
Matevž Mesojednik Security Operations Center (SOC) Manager
Blog

How to evaluate the credibility and quality of a SOC

24. Jan 2022
Read more
Suzana Kužnik
Suzana Kužnik Security Operations Center Analyst
Blog

What to do and what not to do when you are under a cyber attack?

20. Oct 2021
Read more
Suzana Kužnik
Suzana Kužnik Security Operations Center Analyst
Blog

Understanding the Importance of First Steps After a Ransomware Attack

19. Oct 2021
Read more
Jakob Premrn Cybersecurity Analyst
Blog

Basic Principles of OT Security

13. Oct 2021
Read more
Jakob Premrn Cybersecurity Analyst
Blog

Industrial Cybersecurity and how to protect OT environments?

11. Oct 2021
Read more
Jakob Premrn Cybersecurity Analyst
Blog

How to be secure from Ransomware?

6. Oct 2021
Read more
Jakob Premrn Cybersecurity Analyst
Blog

How to Stop Ransomware?

4. Oct 2021
Read more
1 2 3