Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Cybersecurity

Latest blogs

Topic : Cybersecurity
  • --Any--
  • Anonymous research
  • Compliance
  • Cryptocurrency
  • Cybersecurity
  • Dark web basics
  • Dark web research
  • Digital fingerprint
  • Financial crime
  • Fraud and brand misuse
  • Law enforcement
  • OSINT news
  • OSINT research
  • Phishing/malware
  • Product info
  • Secure web access
  • SOC
  • Social media
  • Threat intelligence
  • Trust and safety
  • VPN
  • Zero-trust app access
generia blog

The best defense is a good OSINT

Malicious actors affiliated with China’s Ministry of State Security (MSS) are utilizing publicly available data to identify vulnerabilities…

generia blog

Combating malware in 2020: process, trends and tools

Adversaries are continuously honing their skills, planning for their next attack. How to stay one step ahead? The right framework prepares…

generia blog

Overlooked: "The biggest risk of all"

How is it that global spending on cybersecurity totals more than $100 billion per year, and IT has so little to show for it? Authentic8's…

generia blog

vBulletin 5: zero-day from imperfect patch

Popular forum software platform vBulletin faced a brand new remote code execution zero-day vulnerability. The culprit: an imperfect patch…

The billion-dollar security blanket: a feelgood fallacy

Global cybersecurity spending is approaching $200 billion per year, "without actually preventing advanced persistent threats, ransomware,…

generia blog

Quick guide: how to use Shodan

You may have heard about Shodan on the evening news — as the webcam search engine of choice for creeps and criminals. What doesn'…

generia blog

Remote work: Bad cybersecurity advice galore

Talk is cheap, and web advice is plenty and free on how to secure your IT and digital assets when employees work from home, due to the…

generia blog

IT, legal, compliance: We need to talk.

Different priorities and communication gaps between teams threaten compliance and cybersecurity posture of financial firms, according to…

generia blog

5 Must-reads for CMMC insight

DoD just released the final version of its new contractor cybersecurity requirements, the Cybersecurity Maturity Model Certification (…

Blog updates

Stay updated with the latest posts from the blog
Close
Close