How to prevent the next CyDemic?
Part II
Imagine the next scenario, a western European leader develops cancer cells that needs immediate attention. He complains about lung pains...
Part II
Imagine the next scenario, a western European leader develops cancer cells that needs immediate attention. He complains about lung pains...
Part I
There is an unspeakable plague the healthcare system struggling against – malicious cyber campaigns targeting every healthcare facility of any size...
With 33% of American TikTok users admitting they regularly consume their news on the social video app, it is no wonder that no more than ever...
Today, software is used for everything from entertainment and finance to education and productivity. However, as its applications...
Recently the odix team found a new phishing scenario that possesses a unique threat to end-users. Remittance Advice/ Swift...
As we discussed in Ransomware, a timeline of destruction Part I, while ransomware has its origins in the late 1980’s it didn’t become cyber criminals attack...
Ransomware attacks have recently garnered noticeable attention in the news cycle however, their roots date back over thirty years.
Supply chain cybersecurity is heavily dependent on the complex interchange of a vastly interconnected and geographically diverse ecosystem that is both deep...
The dev-op team from odix is pleased to announce that our full range of content disarm, and reconstruction solutions now have advanced static analysis...
Much of the challenges in 2021 are due to what happened in 2020. These five major events in 2020, discussed in brief below, impacted the way we protect M365 accounts today...
odix Newsletter
Subscribe to odix newsletter and get cyber content to your inbox