Latest publications and studies regarding the subject: hacking.
What are privileged access and accounts - and why do the latter pose a security risk? We'll dive into that in this article.
03-02-2023 · 6 min.
The term zero-day refers to hackers who try to exploit a newly found vulnerability in software and the software vendor then has "zero days" to respond.
02-01-2023 · 6 min.
A Man in the Middle attack involves a third party monitoring a transaction between two parties. Here we explain what it is, and what you can do about it.
30-11-2022 · 7 min.
Dictionary attacks are a type of cyber attack that you can easily prevent by taking some simple precautions. In this article, we explain how.
23-11-2022 · 5 min.
SQL is a code that allows users to interact with databases. But hackers can attack the databases through SQL injections.
07-09-2022 · 8 min.
Read on to learn about a simple but widely used form of hacking that consists of guessing a combination of login information.
10-08-2022 · 11 min.
CISA has revealed the ten attack vectors most exploited by professional hackers to gain access to organisations' networks.
05-08-2022 · 8 min.