Blog

Află ultimele noutăți despre activitatea noastră.

97% of people can't identify a phishing attack

  • 1 year ago
  • posted by: NSHOST

97% of people can't identify a phishing attack

Unfortunately, phishing attacks are very common – in 2021, 83% of organizations experienced at least one phishing attack while another 6 billion attacks are expected in 2022. We can say that one out of 99 emails is a phishing attack. Perhaps most worrying is the fact that 97% of people cannot identify such scams.

Read more

Password policy recommendations: here's what you need to know

  • 1 year ago
  • posted by: NSHOST

Password policy recommendations: here's what you need to know

Users continue to choose weak or easy-to-guess passwords and reuse the same passwords across multiple services. They also tend to question the restrictions: "Which of these rules are reasonable? Which are the most effective? Why do we have all these requirements?"

Read more

Is Cloud Hosting the best solution for your business?

  • 1 year ago
  • posted by: NSHOST

Is Cloud Hosting the best solution for your business?

Cloud hosting is becoming more and more popular due to its simple and efficient functionalities. Used to host websites, manage databases, etc., the cloud solution provides the hosting needed to run a website without purchasing a server with fixed resources, being a scalable solution just clicks away.

Read more

A Romanian white-hacker won the annual web-hacking top for 2021

  • 1 year ago
  • posted by: NSHOST

A Romanian white-hacker won the annual web-hacking top for 2021

Alex Bîrsan took the money from Apple, Microsoft, Tesla, Uber and Netflix, after showing them how they can be attacked. A white hacker passionate about identifying security issues for client companies or running public bounty bug-hunting programs, Alex managed to break into the internal systems of the aforementioned organizations, earning over $130,000 in bounties in the process. Nominated for PortSwigger's annual web hacking list, he reaches the top 10 hacking techniques with his famous 'dependency confusion' technique and then takes the #1 spot. His technique demonstrates that an attacker is able to execute the malware on a company's network, replacing privately used software packages – so-called “dependencies” – with malicious public packages of the same name.

Read more