Introducing Sophos Workspace Protection
Easy, effective, and affordable protection for remote and hybrid workers without the cost and complexity of traditional cloud-delivered stacks. Sophos Workspace Protection is a newly launched security solution designed to help IT teams secure today’s hybrid and...
From Google Redirect to Credential Theft: A Multi-Stage Attack Analysis
Introduction Targeted attacks (APT) no longer threaten only government agencies and critical infrastructure – small and medium-sized businesses are increasingly facing sophisticated attack techniques. Job offer decoy documents, malware distributed through trusted...
Data Protection Incidents Related to the Supply Chain in 2025
January 28 is Data Protection Day. This is a good opportunity to briefly review one aspect of data protection: the risks inherent in supply chains. Many information security laws and standards explicitly identify supply chain risk as an area to be considered. Data...
Black Cell ESM accepted into the Tech Sovereignty Catalogue
Black Cell is proud to share that proprietary ESM (Enterprise Security Monitoring) platform has been officially accepted into the Tech Sovereignty Catalogue. This is an important recognition within the European technology landscape and a significant milestone for our...
Harden your UEFI configurations with Intune and Entra ID
Did you know Microsoft has teamed up with major enterprise OEMs like Dell and HP, to let you configure UEFI settings via the Intune agent? Managing UEFI settings, like enforcing Secure Boot, implementing DMA safeguards, deploying UEFI Updates and other platform...
Growing Together: Richard’s Black Cell Story
At Black Cell, our people are the core of our success - and their stories reflect the culture we’re proud to build every day. This month, we spotlight Richard, whose dedication, leadership, and passion for continuous development have made a significant impact on our...
6 Cybersecurity Trends Shaping the Year Ahead
As we enter 2026, the cybersecurity landscape is at a critical inflection point. Emerging technologies, new adversary business models, and expanding digital ecosystems are creating both opportunities and unprecedented risks. Here’s what security leaders should keep an...
Top 3 Cybersecurity Takeaways from 2025
As we kick off the first week of 2026, it’s the perfect time to reflect on the cybersecurity lessons of 2025. From ransomware attacks to supply chain breaches and the emerging misuse of AI in operational technology (OT), last year reminded us that cyber threats are...
Life at Black Cell: Behind the Scenes With Zsolt
At Black Cell, our people shape who we are - and no one tells that story better than our team itself.In this spotlight, one of our long-time colleagues, Zsolt shares why he chose Black Cell, what keeps him here, and the moments that made their journey truly...
