Blog English

CITRIX WORKSPACE

This article describes the capabilities and architectural features of the Citrix Cloud platform and Citrix Workspace service pack from SecroMix partners. These solutions are the central element and foundation for the implementation of the digital workspace concept from Citrix. Let’s try to understand and formulate causal relationships between cloud platforms, services and Citrix subscriptions. The […]

CITRIX WORKSPACE Read More »

LIMEVPN HACKED – THOUSANDS FROM USERS’ DATA IS OUT AND SOLD

Another fast-paced maneuver started the day at Cyber World. LimeVPN, a VPN service, was recently hacked, exposing the personal information of thousands of users. Following Facebook and LinkedIn, 69,000 LimeVPN customers’ information is now exposed on the dark web! They are also in the process of selling thousands of user records on the Dark Web

LIMEVPN HACKED – THOUSANDS FROM USERS’ DATA IS OUT AND SOLD Read More »

Why Is Penetration Test Important To Your Business?

In today’s world, it is almost impossible to imagine a business without an Internet connection such as a website, email, employee training, CRM (Customer-relationship management), CMS (Content management system). E-commerce, new customer search, record search and retention, etc. simplifies and speeds up the ordering process. Some businesses use off-the-shelf solutions, some hire professionals to build

Why Is Penetration Test Important To Your Business? Read More »

DNS SECURITY

Information security How to hide DNS requests from your ISP’s prying eyes Encrypting the traffic between your device and a DNS service will prevent unauthorized persons from monitoring the traffic or committing a fraud. The end of net neutrality and the weakening of ISPs’ rules for managing network traffic have raised many privacy concerns.  ISPs

DNS SECURITY Read More »

The Threat of Data Theft: Credential stuffing

The Threat of Data Theft: Credential stuffing When we talk about cyber attacks against companies, one word usually comes to mind: malware.  These software can infect systems and not only valuable confidential corporate information but also users, customers, employees, company suppliers, etc.  It’s also capable of stealing information. What is credential stuffing? A credential stuffing

The Threat of Data Theft: Credential stuffing Read More »