online Security

Steganography in contemporary cyberattacks

Steganography in contemporary cyberattacks

A strong upward trend in malware developers using steganography for different purposes is seen, including for concealing C&C communication and for downloading malicious modules

No Free Pass for ExPetr

No Free Pass for ExPetr

Recently, there have been discussions around the topic that if our product is installed, ExPetr malware won’t write the special malicious code which encrypts the MFT to MBR. 

Secure digital transformation is a must

Secure digital transformation is a must

Oracle's research report A Secure Path to Digital Transformation shows security professionals understand the imperative to transform, and reveals the extent to which they see cloud as a secure option of doing so.

Are the current defenses Adequate?

Are the current defenses Adequate?

There are many different methodologies & controls to improve cyber security defense, which can improve current security controls. But are they adequate in protecting users & client computers?

Load More