Russian Сybercriminals Spreading New Tricky Phishing Emails

Russian Сybercriminals Spreading New Tricky Phishing Emails

On April 4, 2022, the government emergency response team of Ukraine CERT-UA has warned of a massive spear-phishing campaign launched by a hacking group UAC-0010 (Armageddon), which is linked to the FSB. It has been informed, that UAC-0010 disseminates malicious emails...
Splunk ES vs. Elastic (ELK) Stack

Splunk ES vs. Elastic (ELK) Stack

The modern digital and globalized world contributes to the fact that sooner or later, each business will meet Security information and event management systems (SIEM) or some individual elements of systems of this class. Let’s try to understand what it is...
Log4Shell: How to Mitigate Log4j Vulnerability

Log4Shell: How to Mitigate Log4j Vulnerability

In the end of 2021, the whole digital world has suffered the new cybersecurity flaw named Log4Shell. A new vulnerability is considered to be one of the worst that have been discovered during the last years. It scored 10 out of 10 points on the CVSS vulnerability...
Cybersecurity as Future for Connected Cars

Cybersecurity as Future for Connected Cars

Human nature possesses both an aspiration to create and an aspiration to destroy. Therefore, when inventing something new, the creator must be prepared for someone who will want to exploit their invention for nefarious gain. As we apply this to the burgeoning...
Cookie theft consequences. How to protect the iGaming business

Cookie theft consequences. How to protect the iGaming business

Recently, the whole gaming world tensed up. One of the largest gaming companies in the USA and Europe faced a massive cyber security breach—hackers have stolen 780 GB of source code for games (such as FIFA, Medal of Honor, Battlefield) of Electronic Arts (EA), a major...
In a flurry of supply chain cyber attacks

In a flurry of supply chain cyber attacks

Supply-chain cyber attacks have become hacker’s most favorite target. Given the domino effect that a cybersecurity breach might trigger—even if just one link of the supply chain is weakened—the outcomes can be disastrous. SolarWinds, Garmin, or Nissan breaches are...