Péter Szöllősi
Tool Tip: How to create honey folders?

Tool Tip: How to create honey folders?

In today's blog post, we will be going over how to create honey folders with no additional tooling. Cyber Deception allows for the placement of traps with no business value, “normal” is defined as no interaction. Its value lies in being probed, attacked, or...

Cybersecurity Tool Spotlight: DeepBlueCLI

Cybersecurity Tool Spotlight: DeepBlueCLI

Searching through Windows event logs can be a daunting task even for the most seasoned professional - even more so if you don't have the experience to know where and what to look for exactly. DeepBlueCLI written by Eric Conrad, is a great Incident response tool due to...

Remote Work Security Do’s and Don’ts Infographic

Remote Work Security Do’s and Don’ts Infographic

As remote work becomes the new norm, ensuring the security of your digital workspace is more critical than ever. Our infographic on Remote Work Security Do's and Don'ts provides essential tips to help you maintain a secure and efficient remote work environment. From...

Spam Email or Phishing Attack? Infographic

Spam Email or Phishing Attack? Infographic

In today’s digital age, our inboxes are often inundated with unwanted emails. Whether it’s a harmless advertisement or a malicious attempt to steal your personal information, understanding the difference between spam emails and phishing attacks is crucial. To help you...

Cyber Threats in the Charity Sector

Cyber Threats in the Charity Sector

The internet is a powerful tool that allows charities to reach and inspire millions of supporters. However, this accessibility comes with significant challenges, as charities are not immune to cybercrime. In fact, the number of cyber attacks on charities is alarmingly...

Top 7 Attacks to Watch Out for

Top 7 Attacks to Watch Out for

In today's digital landscape, staying vigilant against cyber threats is paramount. As technology advances, so do the tactics of malicious actors seeking to exploit vulnerabilities. Here are the top 7 cyber attacks you need to watch out for: 1. Multi-Factor...

6 Common Types of Identity Theft

6 Common Types of Identity Theft

Identity theft is a pervasive threat in our digitally interconnected world. Safeguard your personal information with vigilance and knowledge about the various types of identity fraud: Account Takeover: Cybercriminals infiltrate your online accounts by stealing or...

Cybersecurity Resolutions for 2024

Cybersecurity Resolutions for 2024

Enhance Password Security: Strengthen passwords, use unique ones for each account, and consider adopting a password manager Implement Multi-Factor Authentication (MFA): Add an extra layer of protection to your accounts by enabling MFA wherever possible. Stay Informed:...