Tool Tip: How to create honey folders?

Tool Tip: How to create honey folders?

In today's blog post, we will be going over how to create honey folders with no additional tooling. Cyber Deception allows for the placement of traps with no business value, “normal” is defined as no interaction. Its value lies in being probed, attacked, or...

read more
Cybersecurity Tool Spotlight: DeepBlueCLI

Cybersecurity Tool Spotlight: DeepBlueCLI

Searching through Windows event logs can be a daunting task even for the most seasoned professional - even more so if you don't have the experience to know where and what to look for exactly. DeepBlueCLI written by Eric Conrad, is a great Incident response tool due to...

read more
Routing Protocols 

Routing Protocols 

In a network, cables and network devices can break down at any time, and if there is a problem, packets can fail to reach their destination. Therefore, it is necessary to automatically update the routes. The L3 devices obtain routing information from other routers...

read more
Spam Email or Phishing Attack? Infographic

Spam Email or Phishing Attack? Infographic

In today’s digital age, our inboxes are often inundated with unwanted emails. Whether it’s a harmless advertisement or a malicious attempt to steal your personal information, understanding the difference between spam emails and phishing attacks is crucial. To help you...

read more
Cyber Threats in the Charity Sector

Cyber Threats in the Charity Sector

The internet is a powerful tool that allows charities to reach and inspire millions of supporters. However, this accessibility comes with significant challenges, as charities are not immune to cybercrime. In fact, the number of cyber attacks on charities is alarmingly...

read more