Blog page

Threat hunting with MITRE ATT&CK and Wazuh

Threat hunting with MITRE ATT&CK and Wazuh Threat hunting is the process of looking for malicious activity and its artifacts in a computer system or network. Threat hunting is carried out intermittently in an environment regardless of whether or not threats have...

read more
Blog page

Android phone owner accidentally bypassed lock screen

Android phone owner accidentally bypassed lock screen Cybersecurity researcher David Schütz accidentally found a way to bypass the lock screen on his fully patched Google Pixel 6 and Pixel 5 smartphones, enabling anyone with physical access to the device to unlock it....

read more
Blog page

Growth of Cybercrime Costs | Infographic

Cybercrime will cost companies worldwide an estimated $10.5 trillion annually by 2025, up from $3 trillion in 2015. At a growth rate of 15 percent year over year — cybercrime represents the greatest transfer of economic wealth in history.  ...

read more
Blog page

Where does Cybersecurity End for Electric Utilities?

Where does Cybersecurity End for Electric Utilities? Across the energy sector and between various electric sector locations there are several assets and systems deemed “crown jewel assets” or “mission-critical systems”. Depending on who you ask, nearly every digital...

read more

Pin It on Pinterest