FEATURED POST
Welcome to Logstail.com
We are really happy to welcome you to Logstail.com, a secure and scalable cloud-based log management platform
Why a Firewall doesn’t mean perfect security and why you should consider using a SIEM system
Introduction For many years, a lot of companies have been using firewall systems to protect their data, computer systems and applications. [...]
Pharmaceutical companies under cyber-attacks
Introduction As we have already analyzed in previous articles, the majority of industries such as the maritime and construction sectors, are at [...]
What is zero-day vulnerability and how to prevent zero-day exploits
Introduction In today’s digital world, more and more vulnerabilities are appearing in organization’s systems. Zero-day vulnerabilities are one of them. Vulnerabilities in [...]
What is Data Exfiltration and how it can be countered by companies
Introduction In modern times, one type of cyber-attack that has increased is Data Exfiltration. By Data Exfiltration we define the theft of [...]
Borat RAT Malware: A multi-dimensional cyber-attack
Introduction Generally, a RAT (Remote Access Trojan) is a type of malware that is designed to allow a hacker to remotely [...]
How to reduce third-party vendor risks
Introduction Nowadays, third-party vendors are responsible for a plethora of data breaches that can occur on a company’s system. According to a [...]