CyberSecurity

Feb
11
Why You Should Run Tabletop Exercises for Cybersecurity

Why You Should Run Tabletop Exercises for Cybersecurity

Cybersecurity is not just about having the right tools and policies in place. It is also about how you and
2 min read
Jan
13
How to go passwordless with yubykey, Dashlane and iPhone

How to go passwordless with yubykey, Dashlane and iPhone

Passwords are a hassle. They are hard to remember, easy to forget, and often vulnerable to hackers. That's
3 min read
Dec
09
What is Credential Stuffing and How to Protect Yourself

What is Credential Stuffing and How to Protect Yourself

Credential stuffing is a type of cyberattack that exploits the reuse of usernames and passwords across different websites and applications.
3 min read
Dec
09
Log4j The pain persists

Log4j The pain persists

The log4j vulnerability, also known as Log4Shell, is a serious flaw in a widely used Java logging library that allows
2 min read
Dec
02
Some notes about Google Workspaces Exploits

Some notes about Google Workspaces Exploits

Researchers have found several ways to exploit Google Workspace and Google Cloud Platform features to conduct ransomware, data exfiltration, and
1 min read
Nov
25
Mirai  - botnet

Mirai - botnet

A new Mirai-based botnet exploits a zero-day vulnerability in thousands of routers and cameras from various brands. The vulnerability allows
1 min read