The Bad Batch: Tantiss base security
Cybersecurity measures of Tantiss base as depicted in the third season of “Star Wars: The Bad Batch”
132 articles
Cybersecurity measures of Tantiss base as depicted in the third season of “Star Wars: The Bad Batch”
As per tradition, on May 4, we review the status of cybersecurity in a galaxy far, far away.
How things stood with information security in a galaxy far, far away — nine years before the Battle of Yavin.
Our experts studied the shadow market for initial access to corporate infrastructure.
Our Danish colleague spilled a lot of cybersecurity ink in his works.
A look at what’s changed in the Matrix in the 18 years since the last update.
Even to the naked eye, the Matrix’s flawed implementation threatens the system’s stability and security.
Researchers discovered a critical vulnerability in Apache Log4j library, which scores perfect 10 out of 10 in CVSS. Here’s how to protect against it.
What do James Bond and his Secret Intelligence Service colleagues know about cybersecurity?
Npm package UAParser.js, installed on tens of millions of computers worldwide, has been infected with a password stealer and a miner. Here’s what to do.
To minimize cyberincidents, issue a basic information security guide and make it compulsory reading for onboarding employees.
Examples of the cybersecurity technologies and practices of Durin’s folk abound in Tolkien’s Middle-earth.
How to protect your clients from cybercriminals impersonating your company on Twitter.
Many companies throw out information that can pose a security or reputational risk.
Our technologies detected targeted attacks involving a number of zero-day exploits.
IoT devices tend to greatly increase a company’s attack surface, but you can minimize the risk.
Home and SOHO routers are often insecure, but companies can protect themselves from attacks through remote workers’ home routers.
At RSA Conference 2021, representatives of international financial institutions spoke about the fight against money mules and launderers.