On April 4, 2022, the government emergency response team of Ukraine CERT-UA has warned of a massive spear-phishing campaign launched by a hacking group UAC-0010 (Armageddon), which is linked to the FSB. It has been informed, that UAC-0010 disseminates malicious emails...
by Iryna Yamborska 1. What are Splunk ES and Elastic (ELK) Stack? 2. Main Differences Between Splunk ES and Elastic (ELK) Stack 3. Summary Comparison 4. Conclusion The modern digital and globalized world contributes to the fact that sooner or later, each business will...
by Iryna Yamborska 1. What is Log4Shell? 2. What makes Log4j uniquely dangerous even though you seem protected 3. Which Version is not affected? 4. How to Mitigate the Log4Shell Vulnerability? First aid actions 5. Conclusion In the end of 2021, the whole digital world...
1. Do I Really Need Penetration Testing? 2. Why, When, and How Often to Perform a Penetration Test? 3. What is Penetration Testing? 4. Which Type of Penetration Test Should I Choose? 5. How Much Does Penetration Testing 6. What is The Real Value of Penetration...
Cybersecurity as the new foundation for safe driving By Iryna Yamborska Human nature possesses both an aspiration to create and an aspiration to destroy. Therefore, when inventing something new, the creator must be prepared for someone who will want to exploit their...
Multi-level protection. How to secure the iGaming business from cookie theft consequences? By Iryna Yamborska Recently, the whole gaming world tensed up. One of the largest gaming companies in the USA and Europe faced a massive cyber security breach—hackers have...