Email-based attacks in the COVID-19 era

Email-based attacks in the COVID-19 era

Email-based attacks in the COVID-19 era

Since life in the shadow of the Covid-19 pandemic became “new normal”, we at OP Innovate have seen an excess of business email compromises (BEC)…

Read more >

N3TW0RM Ransomware IOCS

Explore the N3tw0rm ransomware gang operations targeting Israeli companies for ransom, identify IOCs, and seek cyber protection from OP Innovate

Read more >

Prototype Pollution high vulnerability in ‘mixme’ NPM package

NPM (Node Package Manager) is a gigantic software registry that contains hundreds of thousands of open source Node.js projects in the form of packages.

Read more >

Halloween and Cyber-Security: Malware in Disguise

Ghostly greetings one and all. On Halloween night, children the world over dress up in scary costumes and prowl from house to house, asking wary…

Read more >

Innovative Incident Response Framework

In this article, we share our experiences handling cyber incidents, and the sweeping effects our intervention has had on our partners’ organizations. In so doing…

Read more >

Social Engineering Under COVID-19

As a leader of an organization you're always trying to seize the next opportunity while avoiding unnecessary risks and threats. You can prepare clear strategies,…

Read more >

Social Engineering Under COVID-19

DLL Injection Attack in Kerberos NPM package

For those who are not familiar with NPM (Node Package Manager), it is a gigantic software registry that contains hundreds of thousands of open source…

Read more >

DLL Injection Attack in Kerberos NPM package

Don’t Let Hackers Hold Your Business for Ransom

Ransomware is on the rise. It’s one of the biggest dangers facing small and medium-sized businesses (SMBs) today, especially as it doesn’t differentiate between the…

Read more >

Everything You Always Wanted to Know About Passwords

Until quite recently, connecting to a website or online service meant simply typing in a username and password. In the early days, one could even…

Read more >

Under Cyber Attack?

Fill out the form and we will contact you immediately.