6 key insights from the Microsoft survey about cybersecurity in the pandemic era
6 key insights from the Microsoft survey about cybersecurity in the pandemic era The world will be different when the COVID-19 pandemic ends, and that includes the way companies deal
Which countries are most targeted by hackers?
Which countries are most targeted by hackers? A study by Avira, Gatefy’s technology partner, presents worrying data about threats on the internet. The cybersecurity company detected and blocked more than
7 key findings from the 2020 Cost of a Data Breach Report
7 key findings from the 2020 Cost of a Data Breach Report According to the 2020 Cost of a Data Breach Report, data breaches cost businesses an average of USD
What are DMARC, DKIM and SPF? Why should your company adopt them?
What are DMARC, DKIM and SPF? Why should your company adopt them? DMARC, DKIM and SPF are email authentication and validation protocols. These are technologies that strengthen your company’s email
Biggest hack in the history of Twitter involves social engineering: what we can learn from that
Biggest hack in the history of Twitter involves social engineering: what we can learn from that On Wednesday, June 15, the biggest hack in the history of Twitter took place.
What is NLP and how we use it to detect malicious emails
What is NLP and how we use it to detect malicious emails Natural language processing (NLP) is a field of artificial intelligence and machine learning that deals with the ability
Group that committed CEO Fraud and caused losses of EUR 20 million is dismantled
Group that committed CEO Fraud and caused losses of EUR 20 million is dismantled Europol announced today, July 7, that a group of cybercriminals involved in financial fraud and money
What are the 3 types of DMARC policies?
What are the 3 types of DMARC policies? DMARC is an email authentication and validation protocol. It protects the business’s reputation and brand by allowing the company to have control
7 key points from Verizon’s 2020 Data Breach Investigations Report (DBIR)
7 key points from Verizon’s 2020 Data Breach Investigations Report (DBIR) Phishing attacks, use of stolen credentials, and human error are among the main actions behind data breaches, according to
Sextortion scam by allegedly WannaCry hacker group
Sextortion scam by allegedly WannaCry hacker group “We know that you adore ad0lt sites and we know about your sexual addictions. You have a very interesting and sp3cial taste (you