Hacker cracking securities and man checking the Verizon report

Check out the findings of the Verizon report on ransomware, social engineering and phishing

Check out the findings of the Verizon report on ransomware, social engineering and phishing Verizon’s new Data Breach Investigations Report (DBIR) reinforces key aspects that need to be continually discussed

Publicação
Microservice architecture organized on a project

7 benefits of microservice architecture

7 benefits of microservice architecture Microservice architecture is based on a modular approach. In practice, this means developing a system in small parts, the so-called microservices, which are usually placed

Publicação
Servers, locks and security shields to improve SMB security

8 tips to improve small and medium businesses’ (SMBs) security

8 tips to improve small and medium businesses’ (SMBs) security Yes, small and medium businesses (SMBs) are one of the main targets of cyber attacks. Why? First, SMBs don’t usually

Publicação
Broken computer of a professional in need to know the types of anti-spam filters

6 types of anti-spam filters and how they work

6 types of anti-spam filters and how they work The vast majority of internet attacks start with an email. To get an idea of how important it is to talk

Publicação
Monolithic architecture organized on a project

What is microservice architecture and monolithic architecture?

What is microservice architecture and monolithic architecture? Microservice architecture and monolithic architecture are terms used to refer to two ways of thinking and building the architecture of applications and software.

Publicação
Spyware cracking smartphone and being detected by a magnifier

What is spyware?

What is spyware? As its name suggests, spyware is a spy software and one of the top internet threats to businesses and individuals. Spyware is a type of malware (or

Publicação
Hacker stealing login data with FBI director impersonation

Phishing campaign that impersonates FBI director is back

Phishing campaign that impersonates FBI director is back It may sound like a joke, but in this not-so-new phishing scam, cybercriminals are trying to impersonate an FBI director to steal

Publicação
Messages alerting business woman that she needs an incident response plan

6 steps to build an incident response plan

6 steps to build an incident response plan An incident response (IR) plan is a playbook that allows companies to act quickly in the event of cyberattacks and data breaches.

Publicação
Report with data about BEC and man analyses it

BEC remains the most damaging threat, says FBI

BEC remains the most damaging threat, says FBI According to the 2018 Internet Crime Report, gathered by the FBI, Business Email Compromise (BEC) and Email Account Compromise (EAC) attacks continue

Publicação
Bulk junk or graymail delivering an unwanted content

What is the difference between bulk email, junk email and graymail?

What is the difference between bulk email, junk email and graymail? The question is simple but can still cause a lot of confusion: what’s bulk email, junk email and graymail?

Publicação