Blog

Image of login page

Credential harvesting: How it works & tips for prevention

Credential harvesting represents a serious threat to organizations of all kinds – particularly in today’s digital landscape, where virtually every enterprise depends on user credentials for access and security.   According to IBM’s 2025 Threat Intelligence Index, nearly a third... Read More

Grey dragon head on door

DragonForce: Inside the Ransomware-as-a-Service group

​The popularity of Software-as-a-Service (SaaS) has exploded over the past decade. The benefits for organizations are obvious – SaaS is scalable, cost-effective, and doesn’t need complex installation or maintenance. Gartner expects global spending on SaaS to reach $3 billion... Read More

blue closed lock in front of dark backgound

Password spraying: Attack guide and prevention tips 

The phrase ‘spray and pray’ likely came from the military, used to describe inaccurately firing automatic weapons in the hope that one shot eventually found its mark. It’s now used to describe any scenario where a strategy relies on... Read More

Ai vishing blog post article picture blue virtual AI face and lines in front of blue background

AI vishing: Mastering the art of voice deception

Picture an Italian entrepreneur receiving a phone call from their country’s Defense Minister, Guido Crosetto. The politician has an important but challenging ask – he needs the wealthy individual to wire around €1 million to a Hong Kong-based bank... Read More