Our Blog

Home / Blog

T-RAT 2.0: Malware control via smartphone

T-RAT 2.0: Malware control via smartphone

Malware sellers want to attract customers with convenience features. Now criminals can remote control malware during their bathroom routine by just using a smartphone and Telegram app. Advertisments on Russian forums The researcher @3xp0rtblog discovered T-RAT 2.0...

10 Tips to Protect Your Company´s Data in 2021

10 Tips to Protect Your Company´s Data in 2021

The amount, complexity, and relevance of the data that companies handle has increased exponentially. Today the data stored by organizations can contain information from buying and selling transactions, market analysis, ideas for future technological innovations,...

How DLP Helps Financial Institutions Protect Their Data

How DLP Helps Financial Institutions Protect Their Data

Finance is one of the most heavily regulated sectors when it comes to privacy and data protection. Due to the highly sensitive nature of the data, financial institutions collect and process, specialized legislation like the Sarbanes-Oxley Act (SOX) and...

What blockchain means for enterprises and how to keep it secure

What blockchain means for enterprises and how to keep it secure

Blockchain has created new economies based on cheaper and faster transaction record keeping. But can it survive the audit of cybersecurity folk?Back in 2009, the first generation of blockchain technology promised value via its use as a ledger for cryptocurrency...

IT Products 

Netsparker logo
Flexera Logo
Acunetix Logo
Forcepoint Logo
Snow Logo
Ivanti Logo
Progress - ipswitch Logo
Titus Logo
Solarwinds Logo
Endpoint Protector Logo
Kaspersky Logo
Hewlett Packard Enterprise logo
Boldonjames Logo
KnowBe4 Logo

OT Products 

Flexera Logo
Ondeso Logo
Forcepoint Logo
Ivanti Logo
Progress - ipswitch Logo
Kaspersky Logo
Splunk Logo
Symantec logo
CertNexus Logo
Tenable Logo
Rapid1 Logo
Nozomi Logo
G Data Software Logo