[gtranslate]
Type of threat that exploits security vulnerability in Microsoft Office

Spam campaign exploits a security vulnerability in Microsoft Office and WordPad

Spam campaign exploits a security vulnerability in Microsoft Office and WordPad On Twitter, the Microsoft Security Intelligence profile has posted a warning about a new spam campaign that uses malicious

Publicação
Man falling in a new extortion scam

New extortion and phishing scams threaten your business

New extortion and phishing scams threaten your business We received here at Gatefy a new email threat. An attempt of extortion, filtered by our system. In the email, the attacker

Publicação
Cybercriminals use machine learning to attack with malwares

7 ways in which cybercriminals use machine learning to hack your business

7 ways in which cybercriminals use machine learning to hack your business Machine learning (ML) is one of the main pillars of cybersecurity. This branch of artificial intelligence (AI) is

Publicação
Hacker stealing professional identity in domain spoofing

What is domain spoofing?

What is domain spoofing? Domain spoofing is a tactic used by cybercriminals to commit scams and frauds on the internet. It occurs when an attacker tries to impersonate a company,

Publicação
Hacker cracking securities and man checking the Verizon report

Check out the findings of the Verizon report on ransomware, social engineering and phishing

Check out the findings of the Verizon report on ransomware, social engineering and phishing Verizon’s new Data Breach Investigations Report (DBIR) reinforces key aspects that need to be continually discussed

Publicação
Microservice architecture organized on a project

7 benefits of microservice architecture

7 benefits of microservice architecture Microservice architecture is based on a modular approach. In practice, this means developing a system in small parts, the so-called microservices, which are usually placed

Publicação
Servers, locks and security shields to improve SMB security

8 tips to improve small and medium businesses’ (SMBs) security

8 tips to improve small and medium businesses’ (SMBs) security Yes, small and medium businesses (SMBs) are one of the main targets of cyber attacks. Why? First, SMBs don’t usually

Publicação
Broken computer of a professional in need to know the types of anti-spam filters

6 types of anti-spam filters and how they work

6 types of anti-spam filters and how they work The vast majority of internet attacks start with an email. To get an idea of how important it is to talk

Publicação
Monolithic architecture organized on a project

What is microservice architecture and monolithic architecture?

What is microservice architecture and monolithic architecture? Microservice architecture and monolithic architecture are terms used to refer to two ways of thinking and building the architecture of applications and software.

Publicação
Spyware cracking smartphone and being detected by a magnifier

What is spyware?

What is spyware? As its name suggests, spyware is a spy software and one of the top internet threats to businesses and individuals. Spyware is a type of malware (or

Publicação