Log4Shell: How to Mitigate Log4j Vulnerability

Log4Shell: How to Mitigate Log4j Vulnerability

In the end of 2021, the whole digital world has suffered the new cybersecurity flaw named Log4Shell. A new vulnerability is considered to be one of the worst that have been discovered during the last years. It scored 10 out of 10 points on the CVSS vulnerability...
Cybersecurity as Future for Connected Cars

Cybersecurity as Future for Connected Cars

Human nature possesses both an aspiration to create and an aspiration to destroy. Therefore, when inventing something new, the creator must be prepared for someone who will want to exploit their invention for nefarious gain. As we apply this to the burgeoning...
Cookie theft consequences. How to protect the iGaming business

Cookie theft consequences. How to protect the iGaming business

Recently, the whole gaming world tensed up. One of the largest gaming companies in the USA and Europe faced a massive cyber security breach—hackers have stolen 780 GB of source code for games (such as FIFA, Medal of Honor, Battlefield) of Electronic Arts (EA), a major...
In a flurry of supply chain cyber attacks

In a flurry of supply chain cyber attacks

Supply-chain cyber attacks have become hacker’s most favorite target. Given the domino effect that a cybersecurity breach might trigger—even if just one link of the supply chain is weakened—the outcomes can be disastrous. SolarWinds, Garmin, or Nissan breaches are...
Penetration Testing Cost. What is The Price to Avoid Bad Surprises

Penetration Testing Cost. What is The Price to Avoid Bad Surprises

Let me guess: if you are here – you need a pentest. Customers ask you about pentest, or it is a compliance requirement. Or you are the one who takes care of the state of security of the company. If it is your first pentest, you have more questions than answers. Is it...
Healthcare Ecosystem: Strategies to Improve Cybersecurity

Healthcare Ecosystem: Strategies to Improve Cybersecurity

Healthcare institutions, large and small, have always been prime target for cybercrime. Lately, healthcare is transitioning from its traditional focus on disease, accidents, etc., toward the prevention and management of chronic conditions. This means that the...