by Ymir Vigfusson | Apr 25, 2024 | Publication
Lateral movement is a stealthy and dangerous technique employed by cybercriminals to infiltrate and exploit secure networks. As organizations continue to strengthen their cybersecurity measures, it becomes imperative to understand the intricacies of lateral movement...
by Árni Thor Árnason | Apr 16, 2024 | Publication
Cybercriminals employ various methods and techniques to exploit vulnerabilities and gain unauthorized access to sensitive information. Two commonly used tactics are social engineering and phishing. While they may seem similar, it is crucial to understand the...
by Ymir Vigfusson | Apr 7, 2024 | Publication
Remote desktop protocol (RDP) has become an integral part of modern computing. It allows users to connect to and control remote computers, providing seamless access to resources and applications. However, with the increasing reliance on RDP, the security of this...
by Árni Thor Árnason | Mar 21, 2024 | Publication
Cyber threats are becoming increasingly sophisticated, and one of the methods employed to achieve social engineering is through exploiting MFA (Multi-Factor Authentication) fatigue. As individuals and organizations bolster their cybersecurity measures, it is essential...
by Ymir Vigfusson | Mar 18, 2024 | Publication
The commonly known term social engineering refers to the act of manipulating people to gain access to confidential information or to influence their behavior. While traditional social engineering involves the attacker posing as someone else to deceive the target,...
by Ymir Vigfusson | Mar 8, 2024 | Publication
Cyber threats are becoming increasingly sophisticated, organizations need to adopt a proactive approach to network security. One such approach that has gained popularity is the concept of Zero Trust. This article explores the use cases of Zero Trust and provides...