Threats

ImageMagick: The hidden vulnerability behind your online images

ImageMagick: The hidden vulnerability behind your online images

Metabase Q Picks

In a recent APT Simulation, we identified two zero days in ImageMagick. With their validation, we were able to jointly release needed patche
What Your Business Cyber Security Plan must cover, includes Playbook + The 6 Month Secure Growth Plan template
In most areas of our daily life, digitalization represents technological evolution by completely changing the rules on how we handle data pr
In a recent APT Simulation, we identified two zero days in ImageMagick. With their validation, we were able to jointly release needed patche
What Your Business Cyber Security Plan must cover, includes Playbook + The 6 Month Secure Growth Plan template
In most areas of our daily life, digitalization represents technological evolution by completely changing the rules on how we handle data pr
Learn what cybersecurity for kids and teenagers is and why is so important. Tips and strategies to protect your children on internet.
Social networks are increasingly impacting minors. They are more vulnerable to cyber-attacks, which is why precautions must not only be take
The Internet of Things is described as any device connected to an Internet network and where data can be transmitted.
Embajadores de Future Community conversan sobre cómo las alianzas estratégicas impulsan un desarrollo sostenible y la confianza digital.
We tell you about DGA algorithm used by Grandoreiro, that allow us to predict future malicious domains for the rest of the year 2022
The need for collective defense: it all depends on the weakest link Go one step ahead!
In this session, we’ll talk about cybersecurity in Digital Platforms
No data was found

Subscribe to our library

Subscribe to our mailing lists for the latest news and trends and events in cyber security.