The Most Important Question Every SOC Analyst Should Be Asking
Security Operations Centres (SOCs) live and breathe questions such as: What happened? How did it happen? Who is behind it? But there’s one question that cuts...
Security Operations Centres (SOCs) live and breathe questions such as: What happened? How did it happen? Who is behind it? But there’s one question that cuts...
Edge devices are increasingly prime targets for both ransomware groups and nation-state threat actors. VPNs, firewalls, and remote access appliances are freq...
Phishing campaigns will often use bespoke company branding to make their phishing sites more trustworthy. This post discusses how phishing campaigns are able...
Phishing kits are commonly used by adversaries to simplify and scale their operations, enabling them to quickly deploy at scale and often reduce the likeliho...
As the usage of computers and the Internet has significantly increased in recent decades, so has the rate of cybercrime. It is argued that cybercrime is a gl...