Cross-Site Scripting

Also known as XSS, cross-site scripting attacks come in two major forms – reflected and stored (sometimes referred to as persistent). Reflected XSS is the process of reflecting malicious script into a page link. Stored XSS is the process of...

Read More
fileless malware

Cyber criminals are much like cockroaches, i.e. they are continuously adapting. When new security measures are developed and rolled out, they will get to work, finding a loophole that they can exploit. Simply put, they adapt to keep pace in...

Read More
leakerlocker

Have you heard? There's a new type of malware that's threatening to send victims' private messages, pictures, and even their Internet browsing history to their immediate social circle (family members and friends). This threat is called LeakerLocker, and unfortunately, it...

Read More
Big data analytics

There are a lot of things to be concerned about when your company is working with big data. On top of the list of those things is no less than dealing with several aspects pertaining to cybersecurity. The presence of...

Read More
endpoint threats

Cyber criminals are often on the lookout for ways to steal sensitive information and compromise critical systems. Cyber attacks can come from a wide variety of web and email sources. These attacks aim to infect business endpoints. Recent research has...

Read More