Our Blog
Home / Blog
Phishing through e-mail marketing services
To bypass antiphishing technologies, malefactors can use legitimate e-mail service providers, or ESPs — but dangerous letters aren’t unstoppable. Scammers have used various tricks over the years to bypass antiphishing technologies. Another scheme with a high success...
How to save money with storage optimization when using multiple storage vendors
It will come as a surprise to nobody that data is growing exponentially. According to an update from the International Data Corporation (IDC), more than 59 zettabytes (ZB) of data will be created, captured, copied, and consumed globally in 2020. All of that data is...
Cloud Infrastructure Management – Implement Best Practices to Stay Ahead of Challenges
Optimizing cloud costs is a never-ending adventure, but implementing cloud best practices from the beginning is the best way to stay ahead of the inevitable challenges. Managing cloud infrastructure poses new challenges companies aren’t accustomed to with...
How Web Shells Work
A web shell is a malicious script that provides an attacker with a convenient way to launch further attacks using a compromised web server. Web shells are installed after successful initial exploitation and can provide a permanent backdoor into web applications and...
What Top Web Attacks Can We Expect in the New OWASP Top 10?
The latest edition of the Open Web Application Security Project Top Ten was released in 2017, four years after the previous one. Therefore, we can expect that the new version of this cybersecurity report will be out sometime next year. Let us have a look at the...