Do you know how they hacked your account? Part three: Vulnerabilities
In the first two parts, we focused on the user interaction that may cause infection, but sometimes it is not the user […]
Data Security: 5 Best Practices for CISO’s
Since the pandemic, one in five organizations has faced a security breach linked to remote workers. For companies across the globe, the […]
We scanned 5 million+ IP Addresses for database vulnerabilities : Analysis and Insights, 2020
Recently, in the month of August 2020, our team at TIKAJ conducted an extensive research to discover open Mongodb instances all over […]