Get the latest insights from the Moxso blog.
HTTP or HTTPS is included in the URL when you access a web page. But what is the difference? Here we go into more detail about the two protocols.
12-01-2023 · 4 min.
In clone phishing, hackers use an existing email as a template and replace the link in the mail with a malicious one.
09-01-2023 · 9 min.
On 8 December 2022, the Danish Defence was hit by a cyber attack early in the morning. Not until 11 hours later, the attack was successfully defeated.
06-01-2023 · 4 min.
Embezzlement is a form of property crime and refers to an act where a person wrongfully collects and appropriates funds that don't belong to them.
04-01-2023 · 4 min.
The term zero-day refers to hackers who try to exploit a newly found vulnerability in software and the software vendor then has "zero days" to respond.
02-01-2023 · 11 min.
2022 has been a particularly eventful cybersecurity year. Here, we look back at the year that has passed and reflect on what lies ahead.
30-12-2022 · 8 min.
Transport Layer Security (TLS) secures much of the communication that takes place online. Read along to find out more about what it is.
23-12-2022 · 7 min.