The Dubex Incident Response team has been quite busy lately. We’ve observed that one of the most common methods adversaries use to gain access to networks is through VPN solutions that lack two-factor authentication (2FA). 5 security tips from us to you.
Email spoofing is a form of cyber-attack commonly used in phishing attacks and scams. Its purpose is to trick users into thinking a message came from a person or entity they trust. The manipulated email is sent by a hacker and may contain malicious links or false information.
With Dubex Incident Response & Forensics Services, Hørsholm Municipality has strengthened its IT security preparedness. The municipality saves costly, internal IT resources and today has a whole team of IT experts they can reach out to in the event of an attack.
What are the consequences of insufficient cybersecurity for organizations and companies? In this article, we're diving into the obvious and more subtle consequences.
We finally got around to hosting a great housewarming at our new HQ in Glostrup, where former colleagues, friends, and even new teammates stopped by to celebrate with us.
If you missed the live version of our webinar "Digital Shadows - The Hidden Risks of Suppliers", we've got great news for you.
We recorded the entire session and you can watch it whenever your calendar allows you to. So join us as we take a deeper dive into why the supply chain is often a weak link when it comes to cyber security.