Get A Quote
Cybersecurity Threat Intelligence
Cybersecurity Threat Intelligence Resources

Learn more about Cybersecurity Intelligence Threats through the topics below.

6 Misconceptions About Hackers

Ah, the world of hacking - full of myths and misconceptions that seem to stick around like gum on the bottom of your shoe. Let's clear up some of these misunderstandings! First off, let's talk about age. Who says hackers have an expiration date? Some of the most infamous hackers out there have been around for […]
Read Story

A joint investigation against TikTok : What You Need to Know

TikTok the short video sharing app is being investigated by data protection authorities worldwide and a joint investigation by Canadian Data Supervisory Authority has been launched.   Contextual information TikTok is a highly controversial application accused of modifying its algorithm and presenting "dumbed-down" content to the West and creative and educational content in China1. The […]
Read Story

Silicon Valley Bank (SVB) on the Ropes: How Emerging Technologies Led to Its Downfall

In a bold move to prevent the spread of financial contagion and a potentially catastrophic domino effect, U.S. federal regulators have taken decisive action. On Sunday, with the full approval of the U.S. president, they announced that all depositors of Silicon Valley Bank (SVB) will have their deposits fully protected. This unprecedented move comes amidst […]
Read Story

Largest Canadian Bookstore is the Victim of a Zero-Day Cyber Attack

Indigo, the largest Canadian bookstore, reported a cyber attack last month, and since, multiple reports indicate that a cybercriminal gang claimed responsibility for the attack that has compromised massive amounts of sensitive employee information. Indigo has thousands of employees, 86 superstores under Chapters and Indigo banners, and 123 small format stores. BleepingComputer learned from a […]
Read Story

How Threat Intelligence Empowers IT Security Teams

Until the past several years, common IT security philosophy focused on protecting the network perimeter and workstations to prevent cyber attacks. However, with organizations increasingly falling victim to attacks, it has become clear that protection requires new methods, based on Threat Intelligence. Generating usable threat intelligence requires consistent dedication and high levels of expertise. The […]
Read Story
1 2 3 13

Sign Up for Our Newsletter

Sign up to stay up to date on current Cyber Security news

phone-handsetcrossmenu