Blog

 

Posts marked with "cybers"

27.12.2021

Are you at risk from the security vulnerability found in the Java-based Apache Log4j logging feature?

A security hole was discovered in the Java-based Log4j logging feature, affecting millions of businesses, government agencies, and cloud services using this popular Apache library. Are you at risk?

Keep reading
29.10.2021

What are Vulnerability Assessment, Penetration Testing and Red Teaming?

People do not understand the difference between a Red Team Assessment, a Penetration Testing, and a Vulnerability Assessment. You need to understand what are Your goals and then choose the best suitable assessment. What are differences? Let’s find out!

Keep reading
12.10.2021

API Enumeration with Kite Runner

Heavy portion of interaction with modern web applications is done through APIs. And while there existed numerous tools for conventional web application enumeration, none were designed to target APIs specifically, until Assetnote release KiteRunner.

Keep reading
05.10.2021

CYBERS brings IoT security to RigaComm IoT conference

Conclusion about Nordic-Baltic Security Summit 2021 – The No 1 cyber security event and meeting of minds for the Nordic-Baltic region.

Keep reading
04.10.2021

Conference Summary: Nordic-Baltic Security Summit 2021

Conclusion about Nordic-Baltic Security Summit 2021 – The No 1 cyber security event and meeting of minds for the Nordic-Baltic region.

Keep reading
30.09.2021

New kids on the block: Meet e-CSIRT!

eCSIRT – Emergency Computer Security Incident Response Team is a group of specialists who work on solving these types of problems. They will join forces with your organization and bring skills, knowledge, tools, and experience to the table to solve the incident.

Keep reading