Latest articles
See everything-
The importance of the Disaster Recovery Plan (DRP)
Despite the fact that cyberattacks, hardware and software failures, natural disasters, or even human errors are increasingly frequent, many companies still lack a Recovery Plan...
The importance of the Disaster Recovery Plan (DRP)
Despite the fact that cyberattacks, hardware and software failures, natural disasters, or even human errors are increasingly frequent, many companies still lack a Recovery Plan...
-
Obfuscated URLs: The Art of Hiding Malicious Links
Introduction In the current threat landscape, obfuscated URLs are a recurring resource within malicious campaigns. Threat actors resort to this technique not as an end in itself...
Obfuscated URLs: The Art of Hiding Malicious Links
Introduction In the current threat landscape, obfuscated URLs are a recurring resource within malicious campaigns. Threat actors resort to this technique not as an end in itself...
-
When the weak link has a first and last name
We live in the year 2025, in an era where perimeter security is no longer defined by walls, but by microsegmentation, adaptive authentication, and behavioral analysis. Where EDRs no longer...
When the weak link has a first and last name
We live in the year 2025, in an era where perimeter security is no longer defined by walls, but by microsegmentation, adaptive authentication, and behavioral analysis. Where EDRs no longer...






