One of the go tools for attackers are Webshells. In this episode we will explore what these are, their background, how they are used and how you can avoid be turned against you.These deceptive tools bring immense power to the hands of hackers...
During Gitex Global in Dubai I sat down with the leaders and founders of Source Technology an organisation based in Swizerland that developes a tool called Source Security. This is “technology to integrate behavioral analytics with Symbolic...
In today’s episode, we’re shedding light on a critical yet often overlooked aspect of cybersecurity – Indications of Compromise, also known as IOCs. These vital pieces of forensic data can be the canary in the coal mine, alerting...
Today, we’re diving into the world of cybersecurity with an eye to vulnerability scoring system. C We’ve got a topic that’s on the mind of anyone with interest in risk management, one that’s of paramount importance to anyone...