Our selection of alerts on honeypots: report 15 – August 2023
A good understanding of active threats is necessary to achieve a good security posture. The following... Read more

A good understanding of active threats is necessary to achieve a good security posture. The following... Read more
In an Industrial Control System environment, let’s imagine the standard maintenance procedure in which files need... Read more
A good understanding of active threats is necessary to achieve a good security posture. The following... Read more
A good understanding of active threats is necessary to achieve a good security posture. The following... Read more
"30% of CISOs of CAC 40 companies are already convinced of the risks posed by foreign... Read more
A good understanding of active threats is necessary to achieve a good security posture. The following... Read more
A good understanding of active threats is necessary to achieve a good security posture. The following... Read more
A good understanding of active threats is necessary to achieve a good security posture. The following... Read more
A good understanding of active threats is necessary to achieve a good security posture. The following... Read more
Only 17% of SMBs (1) rate their cybersecurity capabilities as ‘effective’ or ‘somewhat effective’. And a... Read more
If you are a SMB owner trying to strengthen your cybersecurity quickly but, most importantly, efficiently,... Read more
RustyStealerDropper Use case A reminder: what are malware droppers?How do they stay in your systems?Deobfuscating a... Read more