Insights > Blog

In the CIPHER blog, you will find helpful information security articles, trends in cybersecurity, and insight on threats and cyber attacks. Our team of information security experts, a multidisciplinary group of professionals, are dedicated to addressing incidents and security best practices in this blog discussion.

Blog

Three Ways You Can Unknowingly Get Hacked

Three Ways You Can Unknowingly Get Hacked

Three Ways You Can Unknowingly Get Hacked Email, text messaging, and phone calls are common and known vectors for attacks. Nowadays, humans engage with each other through countless channels. In certain situations, people might drop their guard and do activities that...

+ Learn more
A Vishing Scam Explored

A Vishing Scam Explored

A Vishing Scam Explored Author: Bill Bowman is Director of Marketing, North America at Cipher Phishing is the term for fooling someone into giving sensitive information or credentials via email. This blog, and many others, have written on the topic extensively. Scams...

+ Learn more
Secure Your Git Directory

Secure Your Git Directory

Secure Coding Tip Using Git Author: Lucas Davis is Red Team Senior Analyst at Cipher Developers use special tools to track the versions of code and then publish the code to production. Git is a popular program for accomplishing this. According to its website, "Git is...

+ Learn more
Two Ways to Hack the Supply Chain

Two Ways to Hack the Supply Chain

Two Ways to Hack the Supply Chain The combination of holiday shopping and a vaccine for COVID-19 have illustrated the importance of supply chains like never before. Goods get to market through supply chains. This post will look at two ways the different elements of a...

+ Learn more
Stop Black Friday Scammers

Stop Black Friday Scammers

Stop Black Friday Scammers The holiday shopping season is here. The Friday after Thanksgiving is known as Black Friday, where retailers roll out deep discounts. In years past, this day meant hordes of early-birds lining up to run into the store. The pandemic and the...

+ Learn more
A Discussion About Business Email Compromise

A Discussion About Business Email Compromise

A Discussion About Business Email Compromise Cipher's Bill Bowman and Scott Croskey chat with FireEye's Jamie Maxfield about how hackers perpetrate business email compromise and what companies can do to stop it.Get started being more secure with Cipher and FireEye by...

+ Learn more
Broken Link Hacking

Broken Link Hacking

Broken Link Hacking The Internet has been around for decades. Hyperlinks are a core element. So common nowadays, their existence is overlooked by the casual browser. When website visitors click a link, they trust that link will take them where they want to go. What...

+ Learn more

Cipher News,

stay updated on the latest cybersecurity
content and relevant news.