On December 23, 2015, Ukrainian power companies experienced unscheduled power outages impacting a large number of customers in Ukraine. This report provides an account of the events that took place based on interviews with company personnel.| Cybersecurity and Infrastructure Security Agency CISA
What is SSL certificate. How do SSL certificates work? Types of Certificates. Related threats and how to avoid.| Gridinsoft Blogs
Multi-Factor Authentication is a practice of applying two or more steps to log into the account. That provides an increased secureness of login.| Gridinsoft LLC
Typosquatting- What is Typosquatting - How Does it Work - Examples Of Typosquatting - How Not to Become a Victim| Gridinsoft Blogs
Data leaks and Data Breaches are very similar phenomena with a major difference in their sources and consequences.| Gridinsoft Blogs
Phishing is a kind of attack of tricking you into sharing login/password, credit card, and other sensitive information by posing as a trusted institution or private person in an email or on-site.| Gridinsoft LLC
Ransomware is malware that encrypts the files on the victim's PC and then asks for the ransom payment. Ransomware injection is one of the most dangerous forms of cyber attacks.| Gridinsoft LLC