
Detection Alert vs Prevention Notification
Since the dawn of cyber warfare, security professionals needed to react to an event as a dreadful alert pushed to their management console, alerting of an ongoing attack or the
Home » Security
Since the dawn of cyber warfare, security professionals needed to react to an event as a dreadful alert pushed to their management console, alerting of an ongoing attack or the
Background We previously covered DLL Hijacking when we discovered extensive vulnerabilities in .NET, which potentially open any .NET application to such attacks. Additionally, this is not the first time that
I recently got a chance to do an interview for Private Internet Access by Marko Velimirovic, link to interview and what I had to say can be found here
Deceptive Bytes’ research team detected in recent days a wave of attacks on European organizations, while the attacks are not that sophisticated, they employ social engineering to make users run
Our CEO, Sagi Lamay, was interviewed to Safety Detectives by Aviva Zack, and this is what he had to say, link to interview can be found here
More and more firms are turning to remote working and, while doing so, expect staff members to remain on top of their jobs using a variety of different devices. This
Despite the numerous advances and innovations in the viruses and malware that cybercriminals have been able to develop, far too many businesses do not take their security as seriously as
Background DLL hijacking (aka spoofing) is an attack on an application where the attacker uses a DLL the application tries to load that is missing or from an unexpected location
Every day, all around the world, malware is attacking organizations and businesses from all sizes, affecting their day-to-day activities and causing businesses losses which can be significant. When you think
Deceptive Bytes latest version and first release of 2020 brings with it an additional boost to organizations’ cyber security stack as we added the capability to control Windows Defender &