Two-step verification can be your best friend but also your worst enemy
Nothing is all good or all bad, however, suspicious user activity cannot be good. This is the story of an …
TSOC cyber center provides comprehensive protection and monitoring abilities powered by intelligent threat detection.
24/7 Monitoring with immediate response around the clock to any threat.
Nothing is all good or all bad, however, suspicious user activity cannot be good. This is the story of an …
We don’t use HP printers here! It was a Saturday morning; we were attending the shift and unanticipatedly, our Incident …
March 21, 2021 Tesla Ransomware Hacker Pleads Guilty; Swiss Hacktivist Charged for Fraud According to several recent articles published by …
קבוצה המזוהה, לפי פרסומים שונים, עם מקורות איראניים העלתה בימים האחרונים לערוץ הטלגרם שלה מסמכים אישיים של ישראלים שאוחסנו בשרתי …
March 03, 2021 As published by BleepingComputer, in an attempt to pressure their victims into paying ransom, the ransomware gang …
February 23, 2021 According to a 2021 report published by CrowdStrike, supply chain attacks, ransomware, data extortion, and nation-state threats …
February 18, 2021 A report published by the French cyber security agency ANSSI in late January described a SolarWinds type …
משה דדוש, מנהל תחום תשתיות אבטחת מידע, טראסטנט
Michael Wainshtain Technical Team Leader, TrustNet LTD
February 07, 2021 A few months ago Microsoft has warned of an increase in consent phishing attacks (also known as …
January 28, 2021 As technology advances, cyber hackers are figuring out new and innovative ways to up their game. The …
January 21, 2021 While ransomware attacks remain one of the main challenges faced by companies in recent years, incurring significant …
אדם ערוץ CISO חברת טראסטנט וראש תחום GRC
Guy Liberman VP Cyber Security, TrustNet LTD
January 01, 2021 Review of the top identified ransomware attacks during the final weeks of December 2020 A review …