Cyber Tips
Cyber Tips
How to Get the Most Out of Your Security Budget in 2025
One of the main factors that prevent organizations from creating a robust cybersecurity program is how tight budgets force them into making short-term, reactive decisions…
Read more >

Your Logs are Talking – Are You Ready to Listen?
How strategic logging practices drive precision in identifying, mitigating and learning from security threats Adversaries thrive in silence. The longer that silence lasts, the more…
Read more >

Email-based attacks in the COVID-19 era
Since life in the shadow of the Covid-19 pandemic became “new normal”, we at OP Innovate have seen an excess of business email compromises (BEC)…
Read more >

N3TW0RM Ransomware IOCS
Explore the N3tw0rm ransomware gang operations targeting Israeli companies for ransom, identify IOCs, and seek cyber protection from OP Innovate
Read more >

Prototype Pollution high vulnerability in ‘mixme’ NPM package
NPM (Node Package Manager) is a gigantic software registry that contains hundreds of thousands of open source Node.js projects in the form of packages.
Read more >

Halloween and Cyber-Security: Malware in Disguise
Ghostly greetings one and all. On Halloween night, children the world over dress up in scary costumes and prowl from house to house, asking wary…
Read more >

Innovative Incident Response Framework
In this article, we share our experiences handling cyber incidents, and the sweeping effects our intervention has had on our partners’ organizations. In so doing…
Read more >

Social Engineering Under COVID-19
As a leader of an organization you're always trying to seize the next opportunity while avoiding unnecessary risks and threats. You can prepare clear strategies,…
Read more >

DLL Injection Attack in Kerberos NPM package
For those who are not familiar with NPM (Node Package Manager), it is a gigantic software registry that contains hundreds of thousands of open source…
Read more >
