by N C | Apr 3, 2023 | blog
Cryptography, a Greek word meaning “secret writing,” is a technique used to securely store and transmit data. It has been used since antiquity in military and diplomatic communication. The message to be encrypted is called plaintext, which can be converted into...
by Tibor Luter | Mar 27, 2023 | blog
Black Cell, a Sophos Platinum Partner, has been recognized for achieving the Sophos Synchronized Security Partneraccreditation. This recognition is a testament to the expertise and commitment of Black Cell’s securityprofessionals who have completed a specialized...
by Tibor Luter | Mar 20, 2023 | blog
The title of this blog post may not be entirely correct, as it is difficult to compare vulnerability assessment with MITRE ATT&CK based gap assessment in objective measures. However, this post aims to evangelize the joint raison d’être of vulnerability...
by Tibor Luter | Mar 6, 2023 | blog
Below you will find information about the current security alerts of February 2023. VMware ESXi – CVE-2021-21974 A new vulnerability was reported by security researchers. This article describes an explosion in the compromises of VMware ESXi hypervisors with...
by Tibor Luter | Feb 23, 2023 | blog
The Open Systems Interconnection model (OSI model) is a conceptual model that ‘provides a common basis for the coordination of [ISO] standards development for the purpose of systems interconnection’. In the OSI reference model, the communications...
by Tibor Luter | Feb 20, 2023 | blog
BEC gangs Midnight Hedgehog and Mandarin Capybara show how online marketing and translation tools are making it easy for these threat groups to scale internationally. Business email compromise (BEC) attacks involve impersonating an executive or business partner in...
Recent Comments