Sandbox for experts
We developed a sandbox capable of emulating a company-specific system in an isolated environment.
666 articles
We developed a sandbox capable of emulating a company-specific system in an isolated environment.
An integrated approach arms even small companies with automated tools that repel complex attacks.
A few stories about how easy it is to accidentally leak sensitive information into the public domain.
Supply-chain attacks through public repositories have become more frequent of late. Here’s how to deal with them.
Our experts uncovered a scheme to extract cardholder data using Google tools.
Israeli experts claim that hundreds of millions of IoT devices contain critical vulnerabilities — and that’s the most conservative estimate.
To protect ADAS from external interference, cars need a special approach to cybersecurity.
Even if a computer is physically isolated, data can be stolen from it using some very unusual methods.
We have released a new solution that provides businesses with code similarity analysis and gives technical evidence for APT attribution.
The abundance of work-related cloud tools and services calls for smart password handling.
Cybercriminals are distributing ransomware disguised as a tool for decrypting files encrypted by the STOP Trojan.
Alongside their benefits, cloud solutions for file storage and document or project management can cause many problems.
How to find an individual approach for each employee without committing to a personal mentor for everyone.
BEC attacks that use compromised mailboxes are especially dangerous. Here’s how we learned to identify them.
To ensure that a vulnerability disclosure doesn’t cause more problems than it solves, we recommend a few simple principles.
Hans Christian Andersen’s report on the Kai infection incident, and the investigation by infosec expert Gerda.
The mass shift to working from home has made ransomware an even greater threat.