Russian Сybercriminals Spreading New Tricky Phishing Emails

Russian Сybercriminals Spreading New Tricky Phishing Emails

On April 4, 2022, the government emergency response team of Ukraine CERT-UA has warned of a massive spear-phishing campaign launched by a hacking group UAC-0010 (Armageddon), which is linked to the FSB. It has been informed, that UAC-0010 disseminates malicious emails...
Splunk ES vs. Elastic (ELK) Stack: Comparison from the SOC Analyst

Splunk ES vs. Elastic (ELK) Stack: Comparison from the SOC Analyst

by Iryna Yamborska 1. What are Splunk ES and Elastic (ELK) Stack? 2. Main Differences Between Splunk ES and Elastic (ELK) Stack 3. Summary Comparison 4. Conclusion The modern digital and globalized world contributes to the fact that sooner or later, each business will...
Log4Shell: How to Mitigate Log4j Vulnerability (CVE-2021-44228)

Log4Shell: How to Mitigate Log4j Vulnerability (CVE-2021-44228)

by Iryna Yamborska 1. What is Log4Shell? 2. What makes Log4j uniquely dangerous even though you seem protected 3. Which Version is not affected? 4. How to Mitigate the Log4Shell Vulnerability? First aid actions 5. Conclusion In the end of 2021, the whole digital world...
Average Penetration Testing Cost. The Real Value of Security Test

Average Penetration Testing Cost. The Real Value of Security Test

1. Do I Really Need Penetration Testing? 2. Why, When, and How Often to Perform a Penetration Test? 3. What is Penetration Testing? 4. Which Type of Penetration Test Should I Choose? 5. How Much Does Penetration Testing 6. What is The Real Value of Penetration...
Cookie Theft Consequences. How to Protect the iGaming Business

Cookie Theft Consequences. How to Protect the iGaming Business

Multi-level protection. How to secure the iGaming business from cookie theft consequences? By Iryna Yamborska Recently, the whole gaming world tensed up. One of the largest gaming companies in the USA and Europe faced a massive cyber security breach—hackers have...