Our Blog

Home / Blog

Babax stealer rebrands to Osno, installs rootkit

Babax stealer rebrands to Osno, installs rootkit

Babax not only changes its name but also adds a Ring 3 rootkit and lateral spreading capabilities. Furthermore it has a ransomware component called OsnoLocker. Is this combination as dangerous as it sounds? Emergence of Babax and Osno Babax stealer is at least around...

Orchestrating data security through effective data identification

Orchestrating data security through effective data identification

As the Fourth Industrial Revolution evolves and our society and its organizations continue transitioning to what some call the “Age of Data”, certain things have become undeniably self-evident. For one, the amount and velocity of data companies face is now far greater...

China’s Personal Information Protection Law: What We Know So Far

China’s Personal Information Protection Law: What We Know So Far

On 21 October 2020, China’s Standing Committee of the National People’s Congress published the first draft of the Personal Information Protection Law (PIPL) for public comment. The PIPL is China’s first attempt to integrate and expand its provisions on the protection,...

What have we learned about mobile security in 2020?

What have we learned about mobile security in 2020?

Whether we like it or not, it is now an established fact that mobile phones play a major role in our day-to-day life, and never has this been truer than in 2020. With opportunities for socializing and travel reduced, it has been a year of scrolling, messaging and...

IT Products 

Netsparker logo
Flexera Logo
Acunetix Logo
Forcepoint Logo
Snow Logo
Ivanti Logo
Progress - ipswitch Logo
Titus Logo
Solarwinds Logo
Endpoint Protector Logo
Kaspersky Logo
Hewlett Packard Enterprise logo
Boldonjames Logo
KnowBe4 Logo

OT Products 

Flexera Logo
Ondeso Logo
Forcepoint Logo
Ivanti Logo
Progress - ipswitch Logo
Kaspersky Logo
Splunk Logo
Symantec logo
CertNexus Logo
Tenable Logo
Rapid1 Logo
Nozomi Logo
G Data Software Logo