Results for: Laptop

What is Credential Stuffing?
Dror Arie, Head of Engineering @ GlobalDots 09.07.20

Credential stuffing is a type of cyberattack where stolen account credentials are used to gain unauthorized access to user accounts through large-scale automated login requests directed against a web application.

In this article, we explain how credential stuffing attacks work and how you can protect yourself against them.

Read More
What is Kubernetes?
Kubernetes Cluster Management
GlobalDots 14.12.18

Kubernetes is an open-source container-orchestration system for automating deployment, scaling and management of containerized applications.

Read More
Two New Bluetooth Chip Flaws Expose Millions of Devices to Remote Attacks
GlobalDots 05.11.18

Two New Bluetooth Chip Flaws Expose Millions of Devices to Remote Attacks

Read More
Phished Credentials Caused Twice as Many Breaches Than Malware in the Past Year
GlobalDots 17.09.18

Phished Credentials Caused Twice as Many Breaches Than Malware in the Past Year

Read More
Botnets Evolving to Mobile Devices
Bot Mitigation & Anti-Fraud
Dr. Eduardo Rocha, Senior Solutions Engineer & Security Analyst @ GlobalDots 29.06.18

Botnets Evolving to Mobile Devices

Read More
Attackers Can Use Sonic and Ultrasonic Signals to Crash Hard Drives
GlobalDots 01.06.18

Attackers Can Use Sonic and Ultrasonic Signals to Crash Hard Drives

Read More