Cryptocurrency/Blockchain Sector Specific MITRE Heatmap
1. Introduction Black Cell’s mission is to stay ahead of cybercriminals, particularly those targeting blockchain and cryptocurrency ecosystems. These sectors face unique adversarial tactics due to their decentralized nature and high-value assets. To provide precise,...
MEA Finance Awards 2024
Black Cell Shines at MEA Finance Magazine Awards 2024 with Innovative MITRE Gap Assessment Solution At Black Cell, we’re proud to share an incredible milestone: winning the prestigious Best Cybersecurity Implementation award at the MEA Finance Magazine Awards 2024!...
Cybersecurity Challenges and Strategic Solutions in the Energy Sector
As energy sector evolves with advancements like smart grids and renewable energy integration, cybersecurity becomes even more critical to address emerging risks. Investing in strong cybersecurity measures and fostering a security-conscious culture within the energy...
Tool spotlight: YARA
In today's blog post, we will be going over a tool that is a must-have in every security analyst's arsenal. Even if you won't use it every day, it is helpful to understand what malware signatures look like in the background. YARA is a powerful pattern-matching tool...
Travel Secure: Essential Cyber Tips for Your Journey
Stay Cyber-Safe While Traveling! Your cybersecurity shouldn't take a vacation when you do. Check out our latest infographic to protect your data on the go: Before You Go: Update your devices and back up important data. Public Transit: Keep your devices secure and...
Black Cell attained the Information Protection and Governance advanced specialization
In the age of AI, with the exponential growth of data and increasing data mobility, customers need expert guidance on implementing effective information protection solutions. They also need strategic insights to better manage and mitigate the risks associated with...
Tool Tip: How to create honey folders?
In today's blog post, we will be going over how to create honey folders with no additional tooling. Cyber Deception allows for the placement of traps with no business value, “normal” is defined as no interaction. Its value lies in being probed, attacked, or...
Cybercriminals Exploit Text-Based Phishing to Target UAE Residents and Visitors
In recent months, a nefarious group of hackers, identified as the Smishing Triad Gang, has launched a sophisticated text-based phishing campaign aimed at stealing personal and financial information from both residents and visitors in the United Arab Emirates (UAE)....
Iran linked hackers targeted Telecom companies across the African continent.
Iranian hackers linked to Iran's Ministry of Intelligence and Security (MOIS) have attacked several companies in the telecommunications sector in Egypt. In Sudan, Tanzania, using a command-and-control (C2) framework called MuddyC2Go. The full capabilities of MuddyC2Go...