EvilGinx – how to simulate a Man in the Middle attack?

EvilGinx – how to simulate a Man in the Middle attack?
Phishing has become the most popular vector of attack.Many attackers use the man-in-the-middle technique. This means that the attacker mediates the communication between the user and the server. This tactic, allows the attacker to bypass 2FA authentication with an app, SMS or one-time code. There is software available on the market to simulate such an attack.. One…

Ransomware – PIH Health

Ransomware PIH Health
PIH Health - jedna z większych organizacji medycznych w Kalifornii, padła ofiarą ransomware. Hakerzy przejęli dane dotyczące aż 17 milionów pacjentów, powodując zakłócenia w funkcjonowaniu placówek oraz poważne ryzyko dla prywatności danych. Atak rozpoczął się 1 grudnia, gdy PIH Health, zarządzająca szpitalami w Downey, Los Angeles i Whittier, odkryła obecność złośliwego oprogramowania w sieci. Przestępcy zażądali okupu…

Christmas cleaning – take care of your devices

Christmass time is a time of reflection, tidying up, and preparing for the new year. So why limit cleaning to your home? In the digital age, our devices are as important a part of daily life as the physical spaces we occupy. This is the perfect moment to organize your digital world. Doing so will improve data…

10 tips to avoid being scammed during holiday online shopping

The Christmass season is a time of joy, but it’s also a period of intense preparations, including shopping for gifts. More and more people turn to online shopping for convenience and time savings. Unfortunately, this season is also a prime opportunity for scammers who exploit our inattention and the pressure of holiday deadlines. So, how can you…

Ideas for unique gifts related to cyber security – part 1

Christmas is getting closer and closer, and if you want to surprise your loved ones with something unconventional, practical and…. secure, I've prepared a list of cyber security inspirations. These ideas are unusual, but sure to be appreciated by technology fans and privacy-minded individuals. 1. Hardware U2F/FIDO2 key - YubiKey For whom? For anyone who uses online…

How to use Microsoft Secure Score to assess Office 365 security?

Microsoft Secure Score is a tool developed by Microsoft and designed to help organizations assess and improve the level of security in the Office 365 environment. It is an indicator of the level of security of our tenant and can be considered as a guide that indicates the actions to be taken to improve security. What is…

How to check if a link is safe? Practical tips

Every day, we receive countless emails and browse many websites – this has become a norm. However, with this convenience also comes risk. Links can lead to malicious websites, viruses, or even phishing attempts. So, how can you check if a link you're about to click is safe? In this article, we'll discuss several practical steps to…

How to secure your IoT devices: 6 practical Steps

How to secure your IoT devices: 6 practical Steps
IoT (Internet of Things) devices bring incredible convenience and functionality, but they also come with risks since they are connected to the Internet, which opens the door to potential threats. To protect your data, privacy, and devices, it is essential to understand and implement the following steps that will help you secure your assets. 1. Change default…

Is a VPN in a company enough security?

Is a VPN in a company enough security?
In today's world, where cyber threats are becoming more complex and widespread, many companies have or are just deciding to implement a VPN as a key component of their security strategy. A VPN offers a number of benefits, such as encryption of data between a company and an employee or between company branches and anonymity on the…