"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.
The lines between state-sponsored Advanced Persistent Threat (APT) attacks, cybercrime, and hacktivism are increasingly becoming blurred. This convergence has created...
Read moreIn recent years, the world has witnessed a rise in state-sponsored cyberattacks aimed at critical infrastructure, causing widespread disruption and...
Read moreBring Your Own Filesystem (BYOF) attacks are a relatively new tactic in cybercrime operation, used to evade detection by security...
Read moreAs with traditional crime, cybercrime is first and foremost a business. In recent years, the cybercrime landscape has undergone significant...
Read moreAs the world becomes increasingly digital, the use of cloud services has skyrocketed. In the wake of the pandemic, cloud...
Read moreIntroduction: The internet is a vast and complex network of connected devices and services, and as such, it has become...
Read moreOn October 21, 2022, Chinese cybersecurity firm Qihoo Netlab 360 discovered a new malware, named xdr33, in the wild. The...
Read moreIn the APAC region, the cyber threat landscape is rapidly evolving and becoming more sophisticated. Advanced Persistent Threat (APT) groups...
Read moreA broken link (also known as a link rot, rotten link, dead links or 404 errors,) is a hyperlink that...
Read moreLog4j is a Java-based logging utility used in numerous applications. It is designed to log information, determine how applications are...
Read more"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.
XRATOR® – copyright 2020-2021
© 2018 JNews by Jegtheme.