Zero-Day Attacks: What Are They and How Can You Prevent Them?
Today, software is used for everything from entertainment and finance to education and productivity. However, as its applications...
Today, software is used for everything from entertainment and finance to education and productivity. However, as its applications...
The threat of malware is growing by the moment. From state sponsored hackers, ideological actors, and ad hoc groups out solely for financial gain...
Recently the odix team found a new phishing scenario that possesses a unique threat to end-users. Remittance Advice/ Swift...
As we discussed in Ransomware, a timeline of destruction Part I, while ransomware has its origins in the late 1980’s it didn’t become cyber criminals attack...
Ransomware attacks have recently garnered noticeable attention in the news cycle however, their roots date back over thirty years.
Supply chain cybersecurity is heavily dependent on the complex interchange of a vastly interconnected and geographically diverse ecosystem that is both deep...
The dev-op team from odix is pleased to announce that our full range of content disarm, and reconstruction solutions now have advanced static analysis...
Much of the challenges in 2021 are due to what happened in 2020. These five major events in 2020, discussed in brief below, impacted the way we protect M365 accounts today...
On March 24 the odix team found a new malware which possess a unique threat to end users. The malware, which was discovered and sanitized by FileWall...
Email has become the lifeblood of global communication. Regardless of age or gender, nationality or economic status, anyone can access an email account and begin to engage with the world...
odix Newsletter
Subscribe to odix newsletter and get cyber content to your inbox