Unmasking the Covert Threat: How Plixer Shields Networks from the Sophisticated Agent Raccoon
The digital landscape can sometimes seem a bit like a dense forest after dark, with new and unseen threats potentially lurking everywhere. That’s why...
The digital landscape can sometimes seem a bit like a dense forest after dark, with new and unseen threats potentially lurking everywhere. That’s why...
Every year, there is a greater number of breach disclosures. Some do so for the first time; for other organizations, it’s the latest in...
In today’s complex cybersecurity landscape, the battle between hackers and defenders is a continuous chess match. Recent revelations about the “Decoy Dog” exploit have...
If you work on a corporate security team, endpoint security is an important framework to understand. After reading this blog, you’ll know the ins...
So far we have used the Scrutinizer API to build a dataset that tells us how many hits our top ten countries are getting....
If this ever changin’ world in which we live in makes you give in and cry say I’m only one guy...
Every once in a while I get the opportunity to sit down and work on things that are outside of the box when it...
Corporate data theft is nothing new. In fact, according to a study conducted by McAfee, “ majority of IT professionals have experienced at least one data...
FaceApp is another selfie service that allows you to share aging and other filtered photos with your friends. It has been downloaded by millions...
Phishing attempts have been showing up a lot in the news lately and scammers are getting smarter. What can we do? What shouldn’t we...
Looking for documentation? Visit our documentation site