Gergő Gyebnár
AI-Powered Cyberattacks: A Growing Threat in 2025

AI-Powered Cyberattacks: A Growing Threat in 2025

    AI is increasingly being used by cybercriminals to carry out more sophisticated and damaging attacks. Here are the most commonly seen AI-fueled cyberattacks:   Phishing - 59% AI-Powered Malware - 39% Advanced Persistent Threats (APTs) - 34% DDoS Attacks - 34%...

Holiday Gift Ideas  for Cybersecurity Pros

Holiday Gift Ideas for Cybersecurity Pros

Celebrate the unsung heroes of the digital world with these thoughtful gift ideas tailored for cybersecurity enthusiasts: 1️⃣ HackerBoxes Monthly Subscription – Unbox fun gadgets, Capture the Flag projects, and tools every month. 2️⃣ Hak5...

Supply Chain Vulnerabilities | Infographic

Supply Chain Vulnerabilities | Infographic

Securing IT supply chains has become a top priority in safeguarding against cyberattacks and compromised products. Cybercriminals increasingly exploit weak points in supply chains, making proactive measures essential. Here’s how to mitigate these risks effectively:...

The Pyramid of Pain Infographic

The Pyramid of Pain Infographic

In the realm of cybersecurity defense, understanding the intricacies of adversary tactics and indicators of compromise (IOCs) is paramount. The Pyramid of Pain, conceptualized by David Bianco, serves as a guiding principle in this pursuit, delineating six distinct...

MITRE ATT&CK Usecases Infographic

MITRE ATT&CK Usecases Infographic

In the ever-evolving landscape of cybersecurity, organizations are constantly seeking robust frameworks to bolster their defense mechanisms against cyber threats. One such invaluable tool gaining prominence is MITRE ATT&CK (Adversarial Tactics, Techniques, and...

10 Cybersecurity Trends in 2024

As we gear up for another year in the digital realm, let's unravel the cybersecurity trends that will shape the landscape in 2024! Generative AI on Both Sides: As AI sophistication skyrockets, expect AI-powered attacks, from deepfake social engineering to adaptive...

The State of OT Security Infographic

The State of OT Security Infographic

In the ever-evolving realm of Operational Technology (OT) security, understanding the current landscape is paramount. Our latest infographic sheds light on key data, providing insights into the challenges and opportunities within the OT security domain. Double the...