by Tibor Luter | Jan 30, 2023 | blog
How Zero Trust Can Help Over the past year, there have been a number of successful ransomware attacks that have made online security a hot topic across the globe. In fact, just recently it was reported that Advanced, a technology vendor that provides the...
by Tibor Luter | Jan 26, 2023 | blog
As a member of the socially responsible professional community, Black Cell would like to raise awareness on best practices to improve an organization’s overall compliance posture with a case study from Hungary on the occasion of World Data Protection Day. On 7...
by Tibor Luter | Jan 25, 2023 | blog
ChatGPT for Offensive and Defensive Cyber There has been a lot of talk recently about ChatGPT and its implications for a wide range of industries. Potential applications are vast, including creative design, technical writing, and programming. In this article,...
by Tibor Luter | Dec 30, 2022 | blog
Forensic Pattern Of Life Analysis Pattern of life analysis isn’t a new concept to anyone who’s ever been involved with intelligence, in particular surveillance. It’s all about the habits that people — suspects, persons of interest, crime victims, or those...
by Tibor Luter | Dec 19, 2022 | blog
Top 10 Cybersecurity Reports 2022 We have collected the most relevant cybersecurity reports of 2022 that are worth checking. Crowdstrike 2022 Crowdstrike Global Threat Report ENISA (European Union Agency for Cybersecurity) ENISA Threat Landscape 2022 Forbes...
by Tibor Luter | Dec 16, 2022 | blog
Cybersquatting encompasses many techniques such as those that can be seen in the table below. Each example shows a cybersquatted version of “google.com”
Recent Comments