information security

WPML: Over 1M WordPress Sites Affected by Remote Code Execution Vulnerability

Recently, news broke that WPML may allow an attacker to conduct remote code execution attacks. Learn more here.

3 weeks ago

Telegram CEO Arrested: Attack on Free Speech or Crime Prevention?

This blog will walk you through the ins and outs of the recent arrest of the CEO of Telegram, Pavel…

3 weeks ago

FBI Director: China’s Cyber Attacks a Threat to the US

According to the FBI director, cyber attacks by China are on the rise. Read this blog and find out more…

2 months ago

An Intro to Secure Internal Communication

In this blog, we walk you through secure internal communication tools and tell you what they're used for.

3 months ago

The Basics of Securing an Application

In the wake of recent news, knowledge of securing both your database and your application is more and more beneficial.…

4 months ago

What Can Be Done with an Email Address? Cybercriminal Perspective

Email addresses are amongst the most frequently stolen pieces of information in data breaches. What can be done with them?…

1 year ago

Cyber Liability vs. Data Breach

In this blog, we walk you through the key similarities and differences between cyber liability and a data breach.

1 year ago

Which Team Is Responsible for Debriefing After a Cyber Attack?

Which team is responsible for debriefing after a cyber attack? Find out here.

1 year ago

3 Ways to Improve the Security of Your Web Application

There are many ways to improve the security of our web applications. In this blog, we provide you with some…

1 year ago