Estimated reading time: 3 minutes
Remote Desktop Protocol (RDP) attacks can be extremely dangerous, whether from an enterprise or a single user point of view. They are basically backdoors which allow external users to access and use a system over the Internet. The United...
Estimated reading time: 3 minutes
Business Email Compromise (BEC), also known as “Man-In-The-Email” or “CEO Fraud”, is a sophisticated type of phishing attack, carried out through elaborate means and usually with devastating effect. The US’s Federal Bureau of Investigation (FBI) estimated that global business...
Estimated reading time: 3 minutes
Traditionally, any discussion about network security is focused on a specific model that organizations have largely internalized. This model is boundary or parameter-based model and assumes of a perimeter or a boundary outside a network. By this model, cybersecurity...