Open Nav
Sign Up

Latest posts from OP Innovate

LATEST BLOG

Defending against the “Pay2key” cyber campaign

During The Last 10 Days, OP Innovate Has Handled A Number Of Cyber Incidents Resulting From The Iranian ‘Pay2key’ Campaign. This Intelligence Gathering And Ransomware…

Read more >

Offensive Campaign To Upgrade Your Cyber Resilience

TL;DR:  Do you have a Cybersecurity strategy? Creating a planned and defined strategy is good advice for any challenge you face in your personal or…

Read more >

Innovative Incident Response Framework

In this article, we share our experiences handling cyber incidents, and the sweeping effects our intervention has had on our partners’ organizations. In so doing…

Read more >

Social Engineering Under COVID-19

As a leader of an organization you're always trying to seize the next opportunity while avoiding unnecessary risks and threats. You can prepare clear strategies,…

Read more >

Social Engineering Under COVID-19

DLL Injection Attack in Kerberos NPM package

For those who are not familiar with NPM (Node Package Manager), it is a gigantic software registry that contains hundreds of thousands of open source…

Read more >

DLL Injection Attack in Kerberos NPM package

Don’t Let Hackers Hold Your Business for Ransom

Ransomware is on the rise. It’s one of the biggest dangers facing small and medium-sized businesses (SMBs) today, especially as it doesn’t differentiate between the…

Read more >

Everything You Always Wanted to Know About Passwords

Until quite recently, connecting to a website or online service meant simply typing in a username and password. In the early days, one could even…

Read more >

Not Swayed by the Bitcoin Hype?

Who do I know who has bitcoin for sale? This question might seem somewhat irrelevant to you right now, especially if you’ve stayed far away from…

Read more >

The Aftermath of the Equifax Breach

In Sept of 2017, news broke that Equifax, one of the world’s three largest consumer credit reporting bureaus, had suffered a massive data breach. This…

Read more >

Cybersecurity Best Practice

Under Cyber Attack?

Fill out the form and we will contact you immediately.