Introducing Black Cell’s New Advisory Service: Compliance for Critical Entities
Black Cell Compliance always strived to interlink cybersecurity controls with regulatory requirements to enable compliance with various control frameworks and legislative instruments. With the adoption of the CER Directive (EU 2022/2557) and its Hungarian...
Black Cell attained Modern Workplace Solutions Partner designation by Microsoft
We are excited to announce that we have achieved the Solutions Partner designation in the Modern Work solution area for both the SMB (Small and Medium Business) and Enterprise segments. By attaining the Modern Work partner designation, our team demonstrates extensive...
Compliance challenges with Generative AI
Introduction Artificial Intelligence (hereinafter referred to as AI) is rapidly reshaping the cybersecurity landscape. As organizations strive to keep up with increasingly sophisticated cyber threats, they turn to AI to gain an edge. Yet this reliance on it brings new...
The Anatomy of a Phishing Email
Phishing emails remain one of the most effective methods cybercriminals use to steal information. These scams rely on social engineering — deceiving users by impersonating trusted brands or individuals to trick them into clicking malicious links or downloading harmful...
Threats of Thoughts: The Cybersecurity Vulnerabilities of Brain-Computer Interfaces
Introduction Brain-Computer Interfaces (BCIs) are rapidly evolving technologies that allow direct communication between the human brain and external devices. While they hold immense potential in medical applications - such as restoring mobility, communication, or...
7 Shocking Cybersecurity Myths That Are Putting Your Business at Risk — And What You Need to Know to Stay Safe
When it comes to cybersecurity, misinformation can be just as dangerous as a real hacker lurking in the shadows. Many businesses and individuals operate under false assumptions about what keeps their data safe — and these myths can leave critical gaps in your...
Most Frequently Compromised Personal Accounts Infographic
Account type % of people affected Social Media 44%Payment Apps 24%Online Shopping 21%Messaging Apps 17%Online Banking 13%Video Streaming Services ...
SharePoint Server Critical Vulnerabilities
We would like to inform you about the following two critical vulnerabilities affecting SharePoint Server (2016, 2019, SE releases), which allow attackers to use a so-called "ToolShell" attack that provides unauthenticated access to systems and enables malicious actors...
10 Sneaky Ways Hackers Steal Your Password — And How to Stop Them!
Think your password is safe? Think again. Cybercriminals have countless tricks to crack your login details — from brute-force attacks to sneaky phishing scams. Check out this infographic to discover the top password attacks you need to know and how to protect...