Cyber Security for Critical Infrastructure: Challenges and Solutions

April 7, 2021 - 4 mins read

With geopolitical tension rising in certain parts of the world along with the ambitions of cyber attackers, coming up with…

533 Million Facebook Users Affected in a Massive Data Breach

April 7, 2021 - 5 mins read

On 3rd April 2021, the personal data of more than 500 million Facebook users globally was published on a low-level…

5 Phishing Techniques Organizations in the MENA Region Should Be Aware of

April 5, 2021 - 4 mins read

No matter how good your technical defense and security policies are, cyber criminals can easily come up with new phishing…

Healthcare Data on Dark Web: How Threat Actors Exploit Covid-19

March 30, 2021 - 4 mins read

The arrival of the COVID-19 pandemic has created several unprecedented circumstances that have completely changed the way the world works.…

A CISO’s Guide to Prevent Ransomware Attacks

March 27, 2021 - 5 mins read

The best way to avoid paying ransom to cyber criminals is to implement security measures in the first place! As…

Cyber Security Buffs: November 2021 Edition

March 25, 2021 - 6 mins read

The Cyber Security Buffs conducted a webinar on 30th November 2020 to celebrate International Computer Security Day. This webinar was…

Ransomware Reminding Cyber Security Experts It Still Exists

March 24, 2021 - 6 mins read

“Ransomware is not only about weaponizing encryption, it’s more about bridging the fractures in the mind with a weaponized message…

5 Important Insights for CIOs & CISOs in 2021

March 23, 2021 - 5 mins read

CIOs and CISOs with good foresight can have a positive impact on the overall cyber security outlook of an organization.…

Tactical Approach to Combat Cyber Attacks in 2021

March 2, 2021 - 5 mins read

“One of the main cyber-risks is to think they don’t exist. The other is to try to treat all potential…

Prevention of Phishing Attacks in 2021

February 24, 2021 - 5 mins read

Phishing attacks use deceptive emails to trick users. They have become one of the foremost attack vectors to deliver malicious…

Recent Blogs