Blog
Incident Response and its Best Practices Using Wazuh
Digital security for the business sector and enterprises is crucial. Keeping this in view, 2021 was marked by cyberattacks and major data breaches. Not just that, also ransomware has emerged as a major role in the cyber community. Wazuh is an open-source security...
Over a Dozen Android Apps on Google Play Store Caught Dropping Banking Malware
A malicious campaign leveraged seemingly innocuous Android dropper apps on the Google Play Store to compromise users' devices with banking malware. These 17 dropper apps, collectively dubbed DawDropper by Trend Micro, masqueraded as productivity and utility apps such...
How Zero Trust can stop the catastrophic outcomes of cyberattacks on critical infrastructure
Over the last few years, essential organisations and services that support our society have become increasingly vulnerable to sophisticated cyberattacks So much so, a recent joint cybersecurity advisory showed that 14 out of the 16 critical national infrastructure...
Whitepaper downloads

Security Operation Center

Compliance and Audit
