background.png

The Cyber Feed

Protection Beyond the Perimeter Starts Here.

Posts by Topic

see all

Get Updates from Us!

Our Once Secure Wi-Fi Standard Has Been Seriously 'KRACK'ed

The potential for infiltrating public Wi-Fi networks has always been a known target for hackers to abuse. But hackers have now 'KRACK'ed their way into secure Wi-Fi networks. According to Mathy ...

Read More

New Research: QR Codes Threat Landscape

You've been hearing all about all the "hidden features" Apple's new iOS 11 has to offer, but you haven't heard how its new native feature for QR code reading provides a 'backdoor' exploitable by ...

Read More

Digitalization In Cyber Security: A Changing Threat Landscape

I'd like you to take a step back and think. What was it like before the smartphone? How did you conduct daily business? How did you communicate with friends, colleagues and customers? You definitely ...

Read More

51% of Cyber Attacks Like Deloitte, SEC and Equifax Happen Because of...

Why do these large scale cyber attacks keep happening? How did a breach like Deloitte,  and Equifax happen that exposed millions of people? While it is too early to determine the full nature of how ...

Read More

The Pros and Cons of Outsourcing Security Services to a Digital MDR: A Guide for CISOs

Digital Managed Detection and Response services (Digital MDRs) are outsourced cyber security teams fundamentally built on strong technological layer. Focusing on protecting businesses from cyber ...

Read More

The Biggest Online Retail Breaches Of All Time

Retailers continue to shift their attention from traditional brick and mortar operations to digital channels, and consumers like it: in 2016, U.S. retailers’ non-traditional sales, which include ...

Read More

Five Cyber Security Training Tips to Keep your Employees on their toes

All it takes is one unsuspecting employee to click on a URL in an email from what appears to be a trustworthy source and your business could be facing the next WannaCry.

Read More

Using Open VNC? You're Totally Exposed- Find Out How!

Allow me to introduce myself, my name is Dvir Sasson and I am a penetration tester (white hat hacker) and a consultant for CyberInt's clients. I've always been curious about learning new things and ...

Read More

You have been breached, now what? Post-incident response guide

What do Bell Canada, the CIA and Hollywood celebrities have in common? They were victims of data breaches in 2017.

Read More

WannaCry, Petya and All That Is Wrong With the Cyber Security Ecosystem

No excuses. Don't even try to act shocked, or tell me you didn't know this could happen. In May 2017, the WannaCry ransomware spread viscously across the worldwide web, affecting more than 300,000 ...

Read More

SUBSCRIBE

download.jpg