PASSWORD DAY – #EBOOK TO READ!

The World Password Day - EBOOK TO READ! For many years, at the beginning of May, we celebrate World Password Day.  Passwords are crucial to our daily lives. They protect our personal and sensitive information from prying eyes and malicious intent! Maintaining all our passwords is becoming more challenging with the increasing...

Ethical implications of cybersecurity

Ethical implications of cybersecurity As our lives become more and more digital, the importance of cybersecurity continues to grow, and ethical implications also need to be considered, such as: Privacy: Cybersecurity mechanisms can help protect against attacks but can also violate individuals' privacy rights. For example, government surveillance programs monitor...

SPIREE Cheat Sheet – Part 2: Threat Intelligence Tools

SPIREE Cheat Sheet - - Part 2: Threat Intelligence Tools Second material from our new series of SPIREE Cheat Sheets!In this part, we present four tools that help in threat intelligence, thereto threat analysis based on information collected from various sources:Shodan (https://www.shodan.io/) is used to search for devices connected to...

SPIREE Cheat Sheet – Part 1: Malware Analysis Tools

SPIREE Cheat Sheet - Part 1: Malware Analysis Tools Today we start a new series of SPIREE Cheat Sheets!  How you can analyze Malware -  we present four tools for this: VirusTotal (https://www.virustotal.com) is a free service that allows you to verify a file, link, IP, or hash. A very...

Can I feel secure being „in the clouds”?

Can I feel secure being "in the clouds"? The cloud and technologies related to it are everywhere in our everyday life - Uber, Pyszne.pl, Gmail, Netflix, etc. All these services have one thing in common - the cloud. Using cloud solutions does not mean buying services in AWS, GCP, or...

(Cyber)safe love

(Cyber)safe love What do love and cybersecurity have in common? Let's consider erotic gadgets, and it turns out that quite a lot;) Almost every device must now be smart, e.g., have a dedicated application, location sharing, etc. This trend also applies to erotic gadgets. Producers of sex toys often do...