Our Blog

Home / Blog

How secure are smart contracts?

How secure are smart contracts?

Smart contracts are related to cryptocurrencies and offer more efficiency than usual contracts in certain areas. Meanwhile, they are only as secure as the programmer's best knowledge. Due to bad programming practices, some contain exploitable flaws. So what kind of...

WHO POLICES THE POLICE?

WHO POLICES THE POLICE?

Discovery for continuous compliance and audit support IT teams are responsible for maintaining the security of the technology and data in any corporate environment. That’s a huge task that requires a lot of self-examination. Without a rigorous, ongoing...

Don’t Trust What You See

Don’t Trust What You See

“Appearances can be deceptive,” the adage goes. The same notion applies to digital content, where people with malicious intent can trick our eyes into believing what they want us to see online. To illustrate this case, while our team was analyzing malware samples, we...

BloodyStealer is hunting for gamers

Gamer accounts are in demand on the underground market. Proof positive is BloodyStealer, which steals account data from popular gaming stores. Julia GlazovaSeptember 27, 2021 In March this year, our experts discovered an ad on an...

IT Products 

Netsparker logo
Flexera Logo
Acunetix Logo
Forcepoint Logo
Snow Logo
Ivanti Logo
Progress - ipswitch Logo
Titus Logo
Solarwinds Logo
Endpoint Protector Logo
Kaspersky Logo
Hewlett Packard Enterprise logo
Boldonjames Logo
KnowBe4 Logo

OT Products 

Flexera Logo
Ondeso Logo
Forcepoint Logo
Ivanti Logo
Progress - ipswitch Logo
Kaspersky Logo
Splunk Logo
Symantec logo
CertNexus Logo
Tenable Logo
Rapid1 Logo
Nozomi Logo
G Data Software Logo