Threat Hunting

  • Blog
  • Threat Hunting

Threat Intelligence

Logically speaking, the very nature of existing cyber security solutions is reactive. We look for some signs that show if any malicious attacks have bypassed or have the possibility to bypass the security systems. This includes your firewall that stops malicious behaviour based on…

Your VPN is not as Secure as You Think

During the early stages of the pandemic, a client reached us asking about their VPN security. As security professionals, we always do our due diligence and shout “its not secure!!”. Is that what we say by default, as security professionals…