Start now

SOC

Building a safe teleworking environment

Building a safe teleworking environment

In this period, organizations face immense challenges in terms of business continuity. But it is also a great opportunity to build the perfect remote environment.

The rise of Emotet

The rise of Emotet

Emotet is a multipurpose malware which is mainly distributed through spam mails. It was first spotted in 2014 and was designed to steal bank account details.

4 steps to manage cybersecurity incidents

4 steps to manage cybersecurity incidents

We understand cybersecurity incidents as any event that can harm a system’s confidentiality, integrity or availability.

Basics- Linux Events Logging

Basics- Linux Events Logging

In this post we will cover the basics of Event Logging in Linux systems. We will talk about Syslog: Message structure, the most famous implementations and main configurations.