top of page

The Big Data Blog


Inside the Volt Typhoon Cyberattack: How a Chinese APT Infiltrated U.S. Critical Infrastructure
In a campaign that has deeply rattled cybersecurity agencies and policymakers, a Chinese state-sponsored threat actor known as Volt...
3 days ago


Sharing Threat Intelligence Between Networks: MISP and Data Diodes
Through MISP and data diodes, cybersecurity communities can establish a standardized and reliable threat intelligence sharing infrastructure.
Apr 15


File Upload Security: Building Resilience Against File-Based Vulnerabilities
Securing the file upload process is not a one-layer job. It demands a combination of policy, technology, and architecture.
Apr 8


5 Tips for Defending Against Zero-Day Exploits
Zero-day exploits occur when cybercriminals identify and exploit a software vulnerability before developers become aware of it.
Mar 28


What is Ransomware as a Service (RaaS)?
Ransomware as a Service (RaaS) is a business model in the cybercrime world where ransomware developers sell or lease their...
Feb 11


Securing Remote Access in a Post-Pandemic World
The COVID-19 pandemic has accelerated the adoption of remote work, creating new cybersecurity challenges for organizations. Organizations...
Jan 28


Milestones in Hacker History: From 2600 to Stuxnet, the Evolution of a Culture
📟 1984: 2600: The Hacker Quarterly sparks hacker culture. The first issue of 2600 laid the foundation for a global hacking community,...
Jan 1


Computer Security Day: How to Secure Cyber Attack Vectors in 2025
The speed at which technology develops doesn’t seem to decrease. Cyber threats, meanwhile, also continue to evolve and get more complex....
Nov 29, 2024


Early-Year Cybersecurity Threats: A Recap
As we embark on a new year, cyber threats show no signs of holiday hibernation. Let’s delve into some alarming incidents witnessed in the...
Jan 16, 2024
bottom of page