Posted in Threats

Mobile network vulnerabilities

Mobile network vulnerabilities are based on exploitable software or hardware flaws in the network interfaces of a device or its applications that make a mobile…

Continue Reading... Mobile network vulnerabilities
Posted in Threats

Shadow IT

Shadow IT is a term that refers to an internal team within a company using information technology (IT) applications and or infrastructure that are managed…

Continue Reading... Shadow IT
Posted in Threats

Unpatched nodes and software

Unpatched nodes and software is when hardware and or software has a known flaw or security weakness. The software or server is unpatched because the…

Continue Reading... Unpatched nodes and software
Posted in Threats


Malvertising is a technique cybercriminals use to inject malicious code into legitimate online advertising networks and web pages. This code typically redirects users to malicious…

Continue Reading... Malvertising
Posted in Threats


Malware or malicious software is any software designed to cause damage to a computer, server, client, or computer network. Malware does the damage after it…

Continue Reading... Malware
Posted in Threats


Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution…

Continue Reading... Phishing
Posted in Threats

Denial-of-service attack

a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users…

Continue Reading... Denial-of-service attack
Posted in Threats

Man-in-the-middle attack

Man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating…

Continue Reading... Man-in-the-middle attack
Posted in Threats

Advanced persistent threats

Advanced persistent threats (APTs) are attacks that gain an unauthorized foothold for the purpose of executing an extended, continuous attack over a long period of…

Continue Reading... Advanced persistent threats
Posted in Threats

SQL Injection

SQL Injection (SQLi) is a type of an injection attack that makes it possible to execute malicious SQL statements. These statements control a database server…

Continue Reading... SQL Injection