Blog

 
Latest blog post
26.09.2023

A Mysterious Broadcast Podcast– UVB-76

In this edition of KüberCAST, Ronnie Jaanhold and Siim Pajusaar, along with guest Andrus Aaslaid, delve deeper into this phenomenon. Tune in to the podcast and discover what lies beneath the seemingly ordinary radio station frequencies.

Keep reading
Latest event
31.05.2023

We are officially ISO 27001 compliant!

In today’s world, it is not enough to claim that we know and do everything safely. Customers and business partners want proof of this statement, and now we can confirm it – we are certified according to the ISO 27001 standard.

Keep reading
02.05.2023

CYBERS & NATO CYBER DEFENSE EXCERCISE LOCKED SHIELDS

Locked Shields is the world’s largest cyber defense exercise of its kind, organized by the NATO Cooperative Cyber Defence Center of Excellence (CCDCOE). The event was held from 18 to 21 April in Tallinn and had nearly 3,000 participants. Participants included NATO member states and NATO-friendly countries (last year Georgia, this year Ukraine). The main CYBERS & NATO CYBER DEFENSE EXCERCISE LOCKED SHIELDS

Keep reading
27.02.2023

How to quantify risk  ?

Can you smell, taste or touch risk? Most probably not. Therefore, IT Risk Expert Bo Thygesen from ACI and KüberCast hosts Siim Pajusaar and Ronnie Jaanhold will discuss how to quantify and measure risk and how to make decisions based on them. During OpSec minutes you will find out that Android TV box with preinstalled malware can be purchased on Amazon and AliExpress. During OpSec minutes you will find out why CISOs should pay more attention to brand impersonations where attacker is impersonating various elements an organization.

Keep reading
13.02.2023

Cyber threat intelligence – your headlights on the internet 

What does threat intelligence mean and is it the weather forecast for internet? What is a cyber threat intelligence (CTI)? Adrian Porcescu from Recorded Future (Director of Product Management, Threat Intelligence) will explain everything with KüberCAST hosts Ronnie Jaanhold and Siim Pajusaar.
During OpSec minutes you will find out why CISOs should pay more attention to brand impersonations where attacker is impersonating various elements an organization.

Keep reading
13.10.2022

Keys that Threaten Your Enterprise Kingdom – Microsoft Windows Domain Takeover

Red-team assessment is recommended, as this type of assessment would show the current company security posture. CYBERS provides expertise and solutions on protecting your environment against these kinds of attacks, so do not hesitate to reach us out!

Keep reading
03.03.2022

Cybersecurity as part of defense measures against modern war fighting capabilities

CYBERS in cooperation with Recorded Future will share insights on the ongoing cyber crisis which started several months before the military invasion. This article provides an overview of the current situation, as well as the recommended emergency actions that should be taken by organizations to withstand this cyber conflict.

Keep reading