Cybersecurity Tool Spotlight: DeepBlueCLI
Searching through Windows event logs can be a daunting task even for the most seasoned professional - even more so if you don't have the experience to know where and what to look for exactly. DeepBlueCLI written by Eric Conrad, is a great Incident response tool due to...
Deep Dive into the Technical Background of Black Cell’s first Capture the Flag Event
On May 17, 2024, Black Cell hosted its first blue-team CTF tournament, SecOps 2024 CTF. Capture the flag (CTF) competitions have become increasingly popular in the field of information security, both for competitive and educational purposes. In these events,...
Remote Work Security Do’s and Don’ts Infographic
As remote work becomes the new norm, ensuring the security of your digital workspace is more critical than ever. Our infographic on Remote Work Security Do's and Don'ts provides essential tips to help you maintain a secure and efficient remote work environment. From...
Routing Protocols
In a network, cables and network devices can break down at any time, and if there is a problem, packets can fail to reach their destination. Therefore, it is necessary to automatically update the routes. The L3 devices obtain routing information from other routers...
Spam Email or Phishing Attack? Infographic
In today’s digital age, our inboxes are often inundated with unwanted emails. Whether it’s a harmless advertisement or a malicious attempt to steal your personal information, understanding the difference between spam emails and phishing attacks is crucial. To help you...
Cyber Threats in the Charity Sector
The internet is a powerful tool that allows charities to reach and inspire millions of supporters. However, this accessibility comes with significant challenges, as charities are not immune to cybercrime. In fact, the number of cyber attacks on charities is alarmingly...
Data is your responsibility, especially when your cloud provider fails you
When using cloud-based services as a customer, it’s easy to forget about one’s own responsibilities: cloud is elastic, agile, scalable, and you don’t have to buy, place and cool big, power-hungry server machines in your datacenter. You pay your monthly bill, and the...
Cybersecurity vs Cyber Compliance Infographic
How Goals and Responsibilities Differ: Cybersecurity vs. Cyber Compliance Cybersecurity and cyber compliance are NOT interchangeable terms. Use this cheat sheet to master the four key responsibilities of each and protect your organization from costly fines. ...
Top 7 Attacks to Watch Out for
In today's digital landscape, staying vigilant against cyber threats is paramount. As technology advances, so do the tactics of malicious actors seeking to exploit vulnerabilities. Here are the top 7 cyber attacks you need to watch out for: 1. Multi-Factor...