Have you ever thought about hunting down malware using bait? In cybersecurity, there’s one particular technique that can be used as bait for attackers: honeypots. In this post, we give a detailed explanation of the nature of low-interaction and...
Outages are deadly for any service or application because customers usually don’t stick around waiting for you to fix the problem. So when building a new solution, you normally try to predict as many security and performance issues as possible and...
The year 2018 has been rich in massive blockchain network breaches and attacks. Just recently, we told you some details about the Bancor exchange hack that resulted in over $13.5 million being stolen as well as the FOMO3D exploit and the most disturbing...
The more popular cryptocurrency and blockchain technology become, the more they draw the attention of hackers. According to recent research by Carbon Black, a total of $1.1 billion in cryptocurrencies was stolen in the first half of 2018. In...
Just as paparazzi always follow celebrities, hackers always keep an eye on popular trends, solutions, and products. Cryptocurrency and blockchain technologies are some of the hottest targets for cyber criminals today. According to a report by Carbon...
Imagine someone calling your phone over and over again, using different phone numbers so you won’t be able to blacklist them. You’d probably end up turning off your phone and becoming unreachable. This is what a usual Distributed Denial of Service...
Containers have made microservices popular among developers, and now many companies are embracing them due to advantages like fast deployment and increased independence of services. However, migrating from a monolithic architecture to a microservices...
The days when blockchain technology was associated only with cryptocurrencies and money exchanges are over. Today, this technology is used in numerous other areas, including online games.
Blockchain technology has managed to change how we imagine a safe transfer of money and data. However, this technology isn’t 100 percent free from exploits and vulnerabilities. In this series, we talk about some of the most recently discovered...
Any lock can be picked, and blockchain technology isn’t completely free from its own security vulnerabilities. In 2018 we’ve already seen several major exchanges like Bancor hacked by criminals eager to get in on the Bitcoin hype. Since our team is...
You’ve undoubtedly heard a lot of buzz around blockchain technology: some people see it as a revolution in data security and others just think it’s a fad that will go away. As cybersecurity experts, we recognize that blockchains are here to stay.
Cloud services offer ready-to-use solutions for many things, including for authentication. It can be quite expensive and time-consuming for organizations to purchase and manage authentication and management systems. Authentication as a Service is both a...
Cyber attacks are becoming more complicated day by day, as hackers are implementing the latest technologies to bypass protection. While ransomware and zero-day exploits were the most widespread threats in past years, sandbox-evading malware is predicted...
We recently worked on a Linux system security-related project in which we needed to hook important Linux kernel function calls such as for opening files and launching processes. We needed it to enable system activity monitoring and preemptively block...
As a security tool, firewalls have proved their effectiveness in protecting networks from malicious actors. Properly configured firewalls can significantly reduce the risk of getting infected with malware or leaking sensitive data.
Shadow IT is one of the most worrying problems for any organization, from small businesses to large enterprises. It creates additional challenges for IT departments and often puts an organization’s entire network at risk. According to Gartner, by 2020,...
On May 25, you probably received way more emails than usual. All those online mailing lists that you didn’t know you were subscribed to as well as all kinds of web apps and websites you’re using probably notified you about changes in their privacy...
Cloud technologies evolve rapidly, offering cloud-based alternatives to almost any known service and product. The recent 2018 Oracle and KPMG Cloud Threat Report states that 87 percent of organizations report having a cloud-first orientation. And...
Ransomware has become one of the most disturbing cybersecurity threats in recent years. Attacks like NotPetya, WannaCry, and Cerber have affected hundreds of thousands of companies and individuals globally. Writing in the MIT Technology Review, Martin...
There are many innovative systems for ensuring software security. But many applications are still vulnerable to hooks and return-oriented programming (ROP) attacks. While it’s impossible to get rid of all vulnerabilities in applications, developers...
 

Let's talk

4000 chars left
Attach a file
Browse
By clicking Send you give consent to processing your data

Book an Exploratory Call

Do not have any specific task for us in mind but our skills seem interesting? Get a quick Apriorit intro to better understand our team capabilities.

Book time slot

Contact Us

P: +1 202-780-9339
E: [email protected]

8 The Green, Suite #7106, Dover, DE 19901
United States