Secure Email Gateway Vs. Integrated Cloud Email Security (SEG Vs. ICES) – What’s the difference, and which should my business use?

When you think of phishing or any form of internet crime, many believe this is something completely remote to them, only happening to a few select individuals that let their…

Critical RCE Vulnerability Reported in Google’s VirusTotal

The vulnerability that existed for the last 8 months allowed attackers to weaponize the VirusTotal platform to achieve remote code execution on an unpatched 3rd party sandboxing machine employing anti-virus…

Behavior-based vs IOC-based Threat Detection Approaches: How to Prioritize?

A core cybersecurity procedure usually includes running detection rules based on the Indicators of Compromise (IOCs). However, the latest trend is focused on the behavior-based detection approach. Let’s find out…

Top Cybersecurity Trends to Watch Out for in 2022

The entire world has been swept by a wave of digitalization over the past few years. From companies to consumers, our reliance on tech devices, digital data, and the internet…

How to Give Your Apple Devices a Cybersecurity Review

Online threats like malware and ransomware attacks against Apple devices especially MacBook are surging and require attention like never before. Cybersecurity is a growing concern in 2022 for everyone –…

Netlas.io: A new atlas of the Internet

A while ago, I decided to test a new analog of Shodan — the Netlas.io platform only to find out that it is quite useful, and deserves a dedicated article.…

CISA Publishes List of Free Cybersecurity Tools and Services

The list is created to achieve goals from CISA’s recommendations that are part of the “CISA Insights: Implement Cybersecurity Measures Now to Protect Against Critical Threats” report released on January 18th,…

Key Features Of Threat Intelligence Platforms

Threat intelligence platforms (TIP) keep the company updated about new potential threats and attacks. Let’s dig deeper into what else TIPs offer. In recent times, incidents related to cybersecurity threats…

MSP vs MSSP: What’s The Difference?

MSPs refer to managed service providers, who offer a wide range of services to their clients. MSSPs, on the other hand, are managed security service providers, who focus exclusively on…

Kali Linux 2021.4 released with Samba compatibility, Apple M1 support, 9 new tools

Kali Linux 2021.4 comes with several improved features, including Samba compatibility, better Apple M1 support, switching package manager mirrors – Download Kali Linux 2021.4 now. Offensive Security has finally released…