Blog

115 Results / Page 2 of 12

Malware artifact/IOC

today

close

Cybersecurity Z. Oualid

What are malware artifacts ?

In the intricate landscape of cybersecurity, understanding the concept of malware artifacts is paramount for safeguarding digital environments. All malwares has their own digitale signature that is represented by their ...

today

close

Systems security Z. Oualid

Top 10 best antivirus

Securing your digital space is paramount in the ever-evolving landscape of cyber threats. Choosing the right antivirus can be the linchpin of your defense. So, what are the top 10 ...

is EDR signature based

today

close

blog Z. Oualid

Is EDR signature based

EDR is one of the most promising solutions in the landscape of cybersecurity. The features and the abilities offered by this technology allow threat hunters and Soc analyst to have ...

EDR and Antivirus

today

close

blog Z. Oualid

Do I need both an EDR and an Antivirus?

In the ever-evolving landscape of cybersecurity, individuals often find themselves navigating through a sea of terms and tools. Today, we delve into the realm of digital defense, pondering the significance ...

today

close

Blockchain Security Z. Oualid

Are Blockchains vulnerable?

In a world increasingly shaped by blockchain technology, we often marvel at its security promises. The distributed and decentralized nature of blockchains has revolutionized industries, promising transparency and tamper-proof transactions. ...