Our Blog
Home / Blog
Package for you. Please scan the QR code
How cybercriminals extract bank card details pretending to be DHL. Online shopping is now an established part of daily life: we get food, clothes and other goods delivered to our door in a couple of clicks. Online shopaholics, of which there are many, are may...
ZTNA is key to securing the hybrid workforce
Zero Trust Network Access (ZTNA) provides remote users with an alternative to slow and clunky VPNs for accessing private business applications. However, not all ZTNA solutions are created equal. In addition to identity-based access control, Zero Trust requires...
Top 3 Reasons to Use Endpoint Data Loss Prevention
The primary tool of today’s business environment is the computer. Whether a desktop or laptop, running on Windows or macOS, these are the devices employees spend most of their working hours in front of and on which they access sensitive information. They are...
$2 million inventory hacked in CS:GO
An unnamed hacker allegedly stole two million dollars’ worth of items from a CS:GO player’s backpack and has already started auctioning off the items. What the hack?! On June 21, a Twitter user who goes by the name of ohnePixel report that $2,000,000+ worth of CS:GO...
The Psychology of Cybercrime
A good criminal needs to know what makes people tick. There is a great deal of psychology involved in criminal activities - especially when it comes to establishing contact with potential victims. Many cyberattacks are successful because cyber criminals misuse human...