6 Tips to Prevent Social Engineering

6 Tips to Prevent Social Engineering

Social engineering is a tactic where the attacker influences the victim to obtain valuable information. Office employees are targeted to reveal confidential data about a corporation while non-specialists can come under the radar to disclose their credit card information. One might also be threatened that the attacker will hack/his her ... Read More
How to Secure Your Content Management System (CMS)

How to Secure Your Content Management System (CMS)

The cybersecurity weaknesses of Content Management Systems make online attacks easy and likely. How to improve CMS security in the enterprise? ... Read More
What is a Magecart attack, and how can you protect your business?

What is a Magecart attack, and how can you protect your business?

Recently, British Airways was slapped with a $230M fine after attackers stole data from hundreds of thousands of its customers in a massive breach. The fine, the result of a GDPR prosecution, was issued after a 2018 Magecart attack. Attackers were able to insert around 22 lines of code into ... Read More
A cybersecurity primer for mid sized businesses

A cybersecurity primer for mid sized businesses

The decision to which information security measures should be used across the company’s IT infrastructure and which ones should be left out may be a tough one for midsized companies. The financial resources of a midsized company cannot allow applying all the existing cybersecurity elements to protect the network. At ... Read More
3 cybersecurity lessons for e-commerce website administrators

3 cybersecurity lessons for e-commerce website administrators

In large part, the security of an ecommerce company is the responsibility of its technical support team and ecommerce software vendors. In reality, cybercriminals often exploit the security illiteracy of the staff to hit a company. Of all the ecommerce team, web administrators are often targeted for hacker attacks as ... Read More
How not to get hacked by state-sponsored actors

How not to get hacked by state-sponsored actors

News about Russian hackers creating chaos in the European Union or Chinese infiltration of a US company has almost become routine. In March 2019, a Russian hacking group was discovered operating on Czech soil by Czech intelligence agencies. Details are still unclear, however, speculations state that the group is part ... Read More
Browser Security: The Worst Code Injections and How They Work

Browser Security: The Worst Code Injections and How They Work

What do browser-based attacks have in common? They target locally installed browsers through malicious code injects ... Read More
Defensive Strategies Industrial Organizations Can Use Against Cyber Attacks

Defensive Strategies Industrial Organizations Can Use Against Cyber Attacks

Industrial organizations are prime targets for spies, criminals, hacktivists and even enemy countries. Spies from rival organizations seek ways to access industrial control systems (ICS) so they can steal intelligence and technology and gain a competitive advantage. Criminals look for ways to ransom companies by locking down IT systems. Hacktivists ... Read More
How to protect your VPN from Data Leaks

How to protect your VPN from Data Leaks

The following news story was reported by the Nine Network just a week after New Year’s Day: an English teacher from Sydney was surprised when she found that her Facebook account was changing in strange ways. Jennifer Howell first noticed that her profile photo had changed, thus prompting her to ... Read More
Security experts, Wolf Halton and Bo Weaver, discuss pentesting and cybersecurity [Interview]

Security experts, Wolf Halton and Bo Weaver, discuss pentesting and cybersecurity [Interview]

This is Part 2 of the interview with our two Kali Linux experts, Wolf Halton, and Bo Weaver, on using Kali Linux for pentesting. In their section, we talk about the role of pentesting in cybersecurity. Previously, the authors talked about why Kali Linux is the premier platform for testing ... Read More
Loading...