by Daniel Molnar | Jun 29, 2017 | Trending
In December 2015 and 2016 there were two blackouts in Ukraine that caused hundreds of thousands of Ukrainians to endure the notorious eastern cold winter for a few hours. At first, this wasn’t an alarming event as blackouts can happen anywhere and anytime, but the...by Anita Batari | Jun 20, 2017 | Security analysis
We always keep our eyes on the logs, data, and charts. We always see abnormalities and unusual behaviours, we have found botnets before, but our recent catch is one of the biggest. These cases are really hard to handle due to the huge number of affected IPs. On the...by Daniel Mecsei | Jun 16, 2017 | Security analysis
Nowadays, the Internet plays a huge part in our lives. It gets bigger and bigger every day, now it has more than one billion websites. Most of these sites are built with CMS which stands for Content Management System. It is a tool that provides an easy-to-use method...by Nikolett Hegedűs | Jun 7, 2017 | Security analysis
Honeypots are a form of proactive threat detections. Proactive threat detection is the next step in improving an organization’s security posture. It has many significant advantages e.g. it provides information about the different kinds of threats attacking the...