All Stories

Pentesting vs Bug Bounty - what to do and when

Many people consider bug bounties and Pentests (often referred to as Penetration Testing) as synonymous. If you’re relatively new to cybersecurity, it’s easy to confuse the two and not quite...

What is a Penetration Test and Why Do You Need It?

The shocking reality is that security breaches have increased by about 67% over the past five years, and in 2020 chances that more companies may eventually get hacked are high....

What is GIT Source Code Exposure Vulnerability and Why Should You Care?

Cybercrime is still a big concern. While businesses put different technologies to patch the known risk profiles, several new vulnerabilities keep springing up in fact that fresh cyberattacks are recorded...

RDP brute force attacks on rise. How to keep your business safe

According to the UNDP, the Covid-19 pandemic is the most significant predicament that has hit us since World War Two. Since its advent, countries have been racing around the clock...

Common Covid-19 Phishing Scams You Should Know

As the coronavirus wreaks havoc around the world, hackers and scammers are seizing on the chaos to launch more phishing attacks. According to research done by Barracuda, Covid-19 related emails...

How to Maintain Cybersecurity for remote workforce during Covid-19

Covid-19 is compelling businesses to permit employees to work from home! Some of the big tech companies that have been impacted by the Coronavirus crisis allowed employees to work remotely...