Have you ever wondered what drives a hacker and shapes their mindset? In this post, we delve into the intriguing world of hackers, exploring their motivations, skills, studies, beliefs, and more. Let's unlock the secrets behind the mindset of a hacker:...
Cybersecurity Safety Tips for Your Summer Vacation Infographic
As we embark on exciting journeys and connect with the world through the power of technology, let's not forget about the importance of safeguarding our digital lives too. Cybersecurity Tips for Travelers Stay Wary of Public Wi-Fi: Public networks may be convenient,...
The Longtail Cost of a Cyberattack Infographic
Cyberattacks are not just immediate threats that disrupt operations and compromise data. They often leave behind a long tail of consequences that can impact organizations in unexpected ways. In this post, we explore the hidden costs that arise from cyberattacks and...
World Anti-Spam Day Takes a Stand Against Digital Clutter
Introduction Since its invention in 1971, email has become an indispensable part of our lives; it's where we organise work-related tasks, the weekend barbecue, but also where we share photos and videos of important events. One, if not the only, positive aspect of the...
A Guide to Phishing Attacks | Infographic
Phishing is a deceptive technique employed by cybercriminals to trick individuals into revealing sensitive information such as login credentials, financial details, or personal data. Typically carried out through fraudulent emails, text messages, or websites, phishing...
Comparing vulnerability assessment with MITRE ATT&CK based gap analysis
The title of this blog post may not be entirely correct, as it is difficult to compare vulnerability assessment with MITRE ATT&CK based gap assessment in objective measures. However, this post aims to evangelize the joint raison d'être of vulnerability assessment...
Hacking scandal of Hungarian KRÉTA public education administration system
As a member of the socially responsible professional community, Black Cell would like to raise awareness on best practices to improve an organization’s overall compliance posture with a case study from Hungary on the occasion of World Data Protection Day. On 7...
Cybersquatting | Infographic
Cybersquatting encompasses many techniques such as those that can be seen in the table below. Each example shows a cybersquatted version of “google.com” Related Posts
Growth of Cybercrime Costs | Infographic
Cybercrime will cost companies worldwide an estimated $10.5 trillion annually by 2025, up from $3 trillion in 2015. At a growth rate of 15 percent year over year — cybercrime represents the greatest transfer of economic wealth in history. Related...