White List Matter
The world of data filtering relies on two fundamental techniques to segregate information: applying blacklisting or whitelisting...
The world of data filtering relies on two fundamental techniques to segregate information: applying blacklisting or whitelisting...
The COVID-19 pandemic has dramatically changed the way we work, with millions of people around the world now working...
Microsoft 365 is a powerful and versatile solution for many businesses. Although it comes packed with a ton of security features...
"Everyone, every organization, assimilates and uses information security tools, from antivirus to sandbox-based methods...
On March 24 the odix team found a new malware which possess a unique threat to end users. The malware, which was discovered and sanitized by FileWall...
In this week's edition of the Lady Hacker Chronicles, we conclude our saga with an end of the year finale. How to plan an Attack in the Age of Social Distance. Do you have what it takes to hack your way to the new year?
In this week's edition of the Lady Hacker Chronicles, we see what it takes to set up a BadUSB attack with Social Engineering...
Everyone is using QR codes these days. Must be safe, right? In this week's edition of the Lady Hacker Chronicles, we see what it takes to launch a QR Scanning Attack. Will you think twice before your next scan?
In this week's edition of the Lady Hacker Chronicles, we dive into Juice Jacking. Hope you're thirsty.
Contact odix support
odix Newsletter
Subscribe to odix newsletter and get cyber content to your inbox