Posts by tag
Fileless malware doesn’t need files on the hard drive and uses PowerShell as one of its main attack vectors, which leads to several cybersecurity challenges.
Credential stuffing is a cyberattack where the perpetrator manages to access user accounts by bombarding credentials until they find the right combination.
New Year is a moment when many of us set ourselves a series of resolutions to try to improve some part of our lives. And…
In our whitepaper, we analyze a real attack, EMOTET, and explain how to protect your endpoints against such cases.
Cyberattacks may get in using employees’ corporate mobiles. For this reason, companies must be aware of the following kinds of mobile security risks.