Demilitarized Zone (DMZ)

In computer security is a layered model that helps subnetwork segmentation based on security requirements and policy. Delimitates the perimeters in a network area, making a difference between internal and external networks. It also provides a transit mechanism from an insecure source to an internal destination, sometimes called a screened subnet.

Learn Security Awareness

ATTACK Simulator is a fun and interactive way to teach your employees essential cybersecurity skills. We take care of security so you can take care of business.

Explosive Phishing Attack Targets Financial Companies

Researchers warn about a new phishing attack targetting employees in financial services, using a poisoned Excel file. This Phishing Attack Uses An Infected Excel File That Can Avoid Detection The MirrorBlast phishing campaign was first spotted by cybersecurity firm ET...

BEC Scams: New Unit 42 Report Reveals Concerning Figures

Palo Alto's Unit 42 just dropped a new report on BEC scams - business email compromise is one of the most common ways scammers ravage organizations, with an average wire fraud attempt of $567,000 with an uptick of $6 million. A new report from Palo Alto's threat...

This Phishing Scam Is After Your Microsoft 365 Account Passwords

A newly discovered phishing scam called TodayZoo sends out URLs to spoofed Microsoft 365 login pages. The Phishing Scam Uses A Copycat Phishing Kit Microsoft has detected an atypical password-stealing phishing scheme that uses a phishing kit created using pieces of...