Log4j Vulnerability, how to stay safe? Apache Log4J As the number of cybersecurity attacks is increasing at every moment, we have to be aware of the new vulnerabilities that can affect us. On November 24, 2021, a zero-day vulnerability was… Read More
Tips to protect your mobile devices
Tips to protect your mobile devices There is no secret that nowadays the technology we use can make us a target to cyber-attacks if we do not have basic knowledge on how to properly protect against these. No manual comes… Read More
How to keep your crypto wallet safe?
How to keep your crypto wallet safe? As cryptocurrencies become more popular and valuable, more and more cybercriminals are turning their attention to them. There are 2 main types of crypto wallets: hot wallets and cold wallets. Hot wallets are… Read More
How to keep your identity and your personal financial information safe in 2021
How to keep your identity and your personal financial information safe in 2021 Surfing the internet Nowadays, billions of people use the Internet and are sharing their personal information through social media and different other ways. Knowing how to keep… Read More
Branding Protection, how we do it?
Branding Protection, how we do it? Our world is surrounded by brands, even if we talk about global brands or small local brands that are trying to become popular, we see them everywhere. But why do we trust a brand?… Read More
5 Măsuri de Securitate in Era COVID-19
Ultima perioadă este cu siguranță una deosebită, prin care noi toți nu am mai trecut. Într-un timp relativ scurt, Covid-19 a pus o presiunea uriașă în toate domeniile de activitate. Cu toate astea, noi cei din industria cybersecurity cunoaștem cât… Read More
Guidance in Cyber Security Trainings
In the need to increase their cyber security resilience, companies start searching for cyber security trainings. This thing, in fact, is a very normal and recommended action. But there are many times when they find themselves in one of these… Read More
Can we detect APT attacks?
In the previous post, we learned what is and how APT (Advanced Persistent Threat) attacks work. But the interesting part comes when we think about: How can we detect such complex attacks? And is there any way to detect APT… Read More
Advanced Persistent Threat Attack and it’s morphology
Advanced Persistent Threat attack – learn what is and how it works The number of cyber attacks is increasing on the internet nowadays. It is not surprising that the World Economic Forum and Global Risk Report placed in 2018 cyber… Read More
CTFs in Cyber-Security
CTFs from the Cyber Security domain, or Capture-The-Flag competitions, have nothing to do with games that imply physical activity (e.g Paintball, Airsoft), but are perfect for hands-on and real-life hacking techniques, just to level up your skills.