Supply Chain Vulnerabilities | Infographic
Securing IT supply chains has become a top priority in safeguarding against cyberattacks and compromised products. Cybercriminals increasingly exploit weak points in supply chains, making proactive measures essential. Here’s how to mitigate these risks effectively:...
Escape the Security Hamster Wheel: How Detection-as-Code Sets SOC Teams Free
Tired of chasing alerts and feeling like you're constantly one step behind attackers? In today's threat landscape, traditional security operations are like running on a hamster wheel – exhausting and ultimately ineffective. SOC teams are drowning in alerts, struggling...
Your MFA solution is unsafe (most likely)
SMS and One Time Passcodes Having any MFA is better than relying on passwords alone, but weak or poorly implemented MFA can still leave organizations vulnerable to attacks. Push and mobile-based one-time passcodes are becoming more and more vulnerable to attacks. With...
Tool Tip: Hunting APT Infrastructure with Validin
In today's blog post we will look at how we can discover additional adversary infrastructure starting from an as simple as initial pivot point as a twitter post with Validin. But first let’s discuss some of the basics. The most basic definition of infrastructure...
Cybersecurity Challenges and Strategic Solutions in the Energy Sector
As energy sector evolves with advancements like smart grids and renewable energy integration, cybersecurity becomes even more critical to address emerging risks. Investing in strong cybersecurity measures and fostering a security-conscious culture within the energy...
Reflecting on Black Cell’s promising 24H1 results
The first half of 2024 was arguably the most dynamic and successful in Black Cell’s 14-year history. We achieved record revenues, with our exports skyrocketing in alignment with our international expansion strategy. Simultaneously, we actively participated in...
Tool spotlight: YARA
In today's blog post, we will be going over a tool that is a must-have in every security analyst's arsenal. Even if you won't use it every day, it is helpful to understand what malware signatures look like in the background. YARA is a powerful pattern-matching tool...
Black Cell attained the Information Protection and Governance advanced specialization
In the age of AI, with the exponential growth of data and increasing data mobility, customers need expert guidance on implementing effective information protection solutions. They also need strategic insights to better manage and mitigate the risks associated with...
Tool Tip: How to create honey folders?
In today's blog post, we will be going over how to create honey folders with no additional tooling. Cyber Deception allows for the placement of traps with no business value, “normal” is defined as no interaction. Its value lies in being probed, attacked, or...