Blog
Articles on cyber-security and latest trends
FEATURED POSTS

How Effective Is Security Training in Preventing Cyber Attacks?

Do your security controls work?
-
Hive Ransomware Data Decryption
The researchers estimated the precision with which they might reconstruct the master key and the number of encrypted files that could be recovered with such a partially known master key by doing various trials.
-
North Korean Hackers Took Advantage of a Chrome zero-day Vulnerability Before the Patch Was Released
Google’s Threat Analysis Group (TAG) said that hacker groups have exploited the Remote Code Execution (RCE) vulnerability that is being monitored in Chrome.
-
The Importance of Password Protection Intelligence
Password protection has a number of well-known disadvantages. One of them, though, has gotten remarkably little notice. That’s how and when businesses can find out if their data has been hacked by outsiders.






