AI Brings a New Pace in Cyber Security  

AI Brings a New Pace in Cyber Security  

Artificial Intelligence to revolutionize cybersecurity 1.76 billion records were leaked in January 2020 alone $11.5 billion is the expected costContinue reading The post AI Brings a New Pace in Cyber Security appeared ...
malware

Malware – The New Age Weaponry

What is malware? Malware is short for ‘Malicious – Software”. The set of code or software that are made intentionallyContinue reading The post Malware – The New Age Weaponry appeared first on ...
The Gocgle Malicious Campaign

The Gocgle Malicious Campaign

| | attacks, Blog, Insights
Can You Spot the Difference Between Gocgle and the Real Thing? Read Our Special Report About Gocgle Malicious Campaign A new web skimming campaign, starting from the end of 2019, is impersonating ...
The Risk of Ex-Domain Re-use on Websites and How to Stay Protected Against It

The Risks of Ex-Domain Re-use on Websites and How to Stay Protected Against It

This article seeks to address a serious issue that has been detected by our platform, including in major enterprises. It concerns the risk of using an undetected “Ex-Domain” (expired domain) on websites, ...
The Coronavirus Impacts on Cybersecurity

The Coronavirus Impacts on Cybersecurity

Protecting Your Website Against Major Threats, Supply-Chain Attacks and Client’s Side Risks on Coronavirus Times The Coronavirus outbreak has now officially been declared as a global pandemic by the World Health Organization ...
Pipka: A New Breed of Anti-Forensic Malicious JavaScript

Pipka: A New Breed of Anti-Forensic Malicious JavaScript

Pipka is one of the most interesting and notorious types of JavaScript skimmers we’ve seen so far. It brings higher level of sophistication, creativity and boldness like never before, as well as ...
Life Cycle of a Security Bug

Life Cycle of a Security Bug

| | attacks, flaws, security, zero-day
Unlike members of the insect family, computer software bugs live forever. Software security bugs (well, flaws) are especially troubling since they demand respect from every software developer now and forever. We want ...
What Is the Low Orbit Ion Cannon (LOIC)?

What Is the Low Orbit Ion Cannon (LOIC)?

The Low Orbit Ion Cannon (LOIC) is a network stress testing application created by Praetox Technologies. It is used as an attack tool in DoS/DDoS attacks. LOIC is a Windows application that ...