Terminal Emulation is still
needed, but it needs to be
EASY to access
Build bridges so you can use all your applications and tools Screenscraping? Actually fun with the right Tools!

Inventu Web Terminal Emulation Blog

As AI technology stands today, there are a host of advantages and disadvantages in using it to strengthen cybersecurity efforts.

The pros and cons of AI in cybersecurity

AI has helped us accomplish a lot of good in the cybersecurity space. But, like most things, there is a list of disadvantages and adverse circumstances.

Continue Reading

How ransomware as a service (RaaS) will affect organizations

Ransomware as a service, often abbreviated as RaaS, is an unethical “business” practice used by threat actors that makes malicious software accessible to just anybody who wants it.

Continue Reading
Health care is just one example of an industry that needs to do better in terms of data security.

Shields Health Care Group suffers a data breach impacting 2 million U.S. patients

The breach compromised sensitive patient information, giving the threat actor(s) access to approximately 2 million patients’ personal data stored with Shields.

Continue Reading
Cybersecurity podcast top picks

Cybersecurity podcast top picks

Stay up to date on the latest cybersecurity news and trends with this list of top podcasts. 

Continue Reading

Don’t forget about the Internet of Forgotten Things

As the Internet of Things has grown, so too have the number of things that are at risk of being forgotten. Find out why it’s important to not let “forgotten” devices slip through the cracks, and how to keep systems secure.

Continue Reading

Overcoming the increase in smartphone malware threats

Increased levels of smartphone malware threats presents new security challenges for individuals and businesses alike. Getting a good understanding of how phone malware works is the first step in keeping your data safe.

Continue Reading

NSA report provides latest recommendations for data security

When it comes to cybersecurity, nobody does it as well as the NSA. A report released by the U.S. intelligence agency offers plenty of advice for you to keep your network secure. 

Continue Reading

Okta comes under scrutiny for withholding Lapsus$ hack in January

Identity management company Okta have gotten themselves in hot water for not making customers and the public aware of a historic breach that has come back to haunt them, following announcements by hacker group Lapsus$.

Continue Reading

New techniques using long-term botnet Qakbot can hijack email threads mid-stream

After more than a decade of Qakbot seeing myriad evolutions, its latest iteration is being used to interject malicious emails midway through your email conversation chain.

Continue Reading

HubSpot data breach targeted cryptocurrency clients

Cryptocurrency investors are quickly becoming a popular target for data breaches. In HubSpot’s March 2022 breach, the personal contact information of crypto firm customers was extracted from almost 30 of its clients.

Continue Reading