Fighting Cyber Risk Across the Supply Chain
Supply chain cybersecurity is heavily dependent on the complex interchange of a vastly interconnected and geographically diverse ecosystem that is both deep...
Supply chain cybersecurity is heavily dependent on the complex interchange of a vastly interconnected and geographically diverse ecosystem that is both deep...
The dev-op team from odix is pleased to announce that our full range of content disarm, and reconstruction solutions now have advanced static analysis...
Much of the challenges in 2021 are due to what happened in 2020. These five major events in 2020, discussed in brief below, impacted the way we protect M365 accounts today...
On March 24 the odix team found a new malware which possess a unique threat to end users. The malware, which was discovered and sanitized by FileWall...
Email has become the lifeblood of global communication. Regardless of age or gender, nationality or economic status, anyone can access an email account and begin to engage with the world...
On Feb 24 the odix team noticed a new phishing campaign which contained an HTML attachment spoofing a Microsoft login page...
In this week's edition of the Lady Hacker Chronicles, we conclude our saga with an end of the year finale. How to plan an Attack in the Age of Social Distance. Do you have what it takes to hack your way to the new year?
‘It’s an asymmetric game where the attacker only needs to succeed once while the defender needs to block everything’ ...
Summary: On Oct 23, the odix team detected a file-based phishing malware in an email attachment that was blocked by FileWall system. To avoid detection the blocked attachment redirected the user to a website requiring...
Summary: On Oct 21, the odix team detected a file-based phishing malware in an email attachment that was blocked by the FileWall system.
odix Newsletter
Subscribe to odix newsletter and get cyber content to your inbox