data security landscape

The data security landscape is constantly evolving. The state it is currently in can vary as quickly as in a month. The irreversible shifts happen not only because of changing regulations, e.g. the enactment of the European Union's General Data...

Read More
Cross-Site Scripting

Also known as XSS, cross-site scripting attacks come in two major forms – reflected and stored (sometimes referred to as persistent). Reflected XSS is the process of reflecting malicious script into a page link. Stored XSS is the process of...

Read More
fileless malware

Cyber criminals are much like cockroaches, i.e. they are continuously adapting. When new security measures are developed and rolled out, they will get to work, finding a loophole that they can exploit. Simply put, they adapt to keep pace in...

Read More
leakerlocker

Have you heard? There's a new type of malware that's threatening to send victims' private messages, pictures, and even their Internet browsing history to their immediate social circle (family members and friends). This threat is called LeakerLocker, and unfortunately, it...

Read More
Big data analytics

There are a lot of things to be concerned about when your company is working with big data. On top of the list of those things is no less than dealing with several aspects pertaining to cybersecurity. The presence of...

Read More