Our Blog

Home / Blog

Weaponizing game code to attack a company

Weaponizing game code to attack a company

An unusual case of an attack executed by weaponizing legit video game code.Released on PC and consoles in September 2020, the action-adventure video game Genshin Impact was created by miHoYo Limited of China. The Windows version comes with a module combating gaming...

The real reason why malware detection is hard and underestimated

The real reason why malware detection is hard and underestimated

Researchers develop an AI with a 98% malware detection rate and 5% false positive rate. If you think this is a splendid technology for antivirus software, this article might change your mind. Malware detection is undecidable but not impractical Fred Cohen already gave...

The Roadmap to Adopting SASE in 2022 According to Gartner

The Roadmap to Adopting SASE in 2022 According to Gartner

Secure Access Service Edge (SASE), the converged networking and security approach first proposed by Gartner, is rapidly becoming the de facto architecture for connecting and protecting distributed businesses and hybrid workforces. Its combination of SD-WAN networking...

About Our Blog

GSCT Blog brings the latest Security news, online Security information, views & updates

Categories

Our Instagram Posts

IT Products 

Netsparker logo
Flexera Logo
Acunetix Logo
Forcepoint Logo
Snow Logo
Ivanti Logo
Progress - ipswitch Logo
Titus Logo
Solarwinds Logo
Endpoint Protector Logo
Kaspersky Logo
Hewlett Packard Enterprise logo
Boldonjames Logo
KnowBe4 Logo

OT Products 

Flexera Logo
Ondeso Logo
Forcepoint Logo
Ivanti Logo
Progress - ipswitch Logo
Kaspersky Logo
Splunk Logo
Symantec logo
CertNexus Logo
Tenable Logo
Rapid1 Logo
Nozomi Logo
G Data Software Logo