In a world where technology evolves at an unprecedented pace, there are few things as exciting as stumbling upon a device that captures the spirit of the past while embracing the possibilities of the future. The Beepy, a compact handheld device developed by SQFMI,...
Frequency of Ransomware Attacks Infographic
Startling statistics reveal a sobering reality - ransomware attacks are becoming more frequent and relentless. According to recent data, by the year 2031, a ransomware attack will strike every 2 seconds. This alarming trend emphasizes the critical need for...
The Anatomy of a Hacker Infographic
Have you ever wondered what drives a hacker and shapes their mindset? In this post, we delve into the intriguing world of hackers, exploring their motivations, skills, studies, beliefs, and more. Let's unlock the secrets behind the mindset of a hacker:...
Cybersecurity Safety Tips for Your Summer Vacation Infographic
As we embark on exciting journeys and connect with the world through the power of technology, let's not forget about the importance of safeguarding our digital lives too. Cybersecurity Tips for Travelers Stay Wary of Public Wi-Fi: Public networks may be convenient,...
The Longtail Cost of a Cyberattack Infographic
Cyberattacks are not just immediate threats that disrupt operations and compromise data. They often leave behind a long tail of consequences that can impact organizations in unexpected ways. In this post, we explore the hidden costs that arise from cyberattacks and...
World Anti-Spam Day Takes a Stand Against Digital Clutter
Introduction Since its invention in 1971, email has become an indispensable part of our lives; it's where we organise work-related tasks, the weekend barbecue, but also where we share photos and videos of important events. One, if not the only, positive aspect of the...
A Guide to Phishing Attacks | Infographic
Phishing is a deceptive technique employed by cybercriminals to trick individuals into revealing sensitive information such as login credentials, financial details, or personal data. Typically carried out through fraudulent emails, text messages, or websites, phishing...
Comparing vulnerability assessment with MITRE ATT&CK based gap analysis
The title of this blog post may not be entirely correct, as it is difficult to compare vulnerability assessment with MITRE ATT&CK based gap assessment in objective measures. However, this post aims to evangelize the joint raison d'être of vulnerability assessment...
Hacking scandal of Hungarian KRÉTA public education administration system
As a member of the socially responsible professional community, Black Cell would like to raise awareness on best practices to improve an organization’s overall compliance posture with a case study from Hungary on the occasion of World Data Protection Day. On 7...