top of page
Jul 19, 202214 min read
How a Cyberattack Could Effect Your Company's Bottom Line
According to every relevant study and industry source — cybercrime has been on a meteoric rise in the past couple of years. Throughout...
May 30, 20225 min read
Think twice before you post that picture – check out SOCMINT (social media OSINT).
These days, we share more of our personal information online than ever before — in most cases, without even realizing it. In fact,...
May 20, 20224 min read
OSINT - the go-to tool for cryptocurrency forensics
While cryptocurrencies have theoretically been aimed at democratizing the global financial system, they’ve also ushered in a wave of...
May 9, 20223 min read
Horizontal and Vertical Domain enumeration
When performing any security assessment, domain names are a vital element of the reconnaissance phase – mapping the attack surface...
May 3, 20224 min read
The AI-bots are coming (to OSINT)
AI has had a deep impact on OSINT investigations, by way of increasing scale, efficiency and accuracy.
Feb 11, 20223 min read
The Olympic cyber games
As we transition to an increasingly digital world, every aspect of our lives is becoming augmented with digital technology. In most...
Dec 13, 20214 min read
Log4Shell - what we know and how can you protect yourself.
On December 9th, Alibaba Cloud Security team's Chen Zhaojun reported a critical vulnerability (called "Log4Shell", designated -...
Jun 3, 20217 min read
Why must Cyber Security and Digital Transformation programs go hand in hand?
The COVID-19 pandemic has upended plenty of societal, cultural, and business norms that we’ve previously grown accustomed to. And one of...
Jun 1, 20217 min read
Enterprise Security - it's a Marathon, Not a Sprint.
Tacitus, one of the greatest historians and scholars of Ancient Rome, claimed that “the desire for safety stands against every great...
May 6, 20217 min read
Building Customer Cyber Security Trust - One step at a time
Whether it’s for business or personal use, the internet has embedded itself in every part of our modern lives. Customers and online...
May 3, 20216 min read
Managing Cyber Security Programs - How to Effectively Communicate Success
When it comes down to it, it’s up to your business or organization’s leadership and directors to take responsibility for the business’s...
Apr 26, 20218 min read
The Importance of Information Assurance and Cybersecurity in a Changing World
Data has become the most valuable new commodity in the information age. As users on the internet, we’re constantly exchanging data with...
Apr 15, 20216 min read
Third Party Risk Assessment Fatigue - Why should you care?
Mutual efficiency is key to your third party risk program's success - learn more about the problem and how to mitigate it's effects
Feb 18, 20215 min read
Supply Chain Security in the Shadow of Centreon and Solarigate
In light of the recent Solarigate and Centreon cyber-attacks, you may be wondering how to protect yourself from such attacks. This...
Dec 16, 20202 min read
SolarWinds Attack Report
A summary and recommendations for mitigation of the recent SolarWinds Global Cyber Security Incident. Executive Summary: While...
Dec 13, 20208 min read
How to make your small business a hacker’s nightmare
Millions of dollars are being spent by enterprises on the latest cyber security software and services, talented engineers are hired at...
Dec 13, 20202 min read
Supply Chain Cyber Attack on Strategic Logistics Software Company “Amital”
An attack on the servers at the software company Amital led to subsequent infiltration to about 40 other Israeli Logistics companies. The la
bottom of page