Latest news

artificial intelligence
Cybersecurity

Thinking of using artificial intelligence? Take care with data confidentiality!

The use of platforms based on artificial intelligence and machine learning, such as chatbots and generative artificial intelligence tools, has become increasingly popular in several sectors. More accessible to the general public, these resources can actually assist professionals in their daily routines, automating tasks, facilitating customer service, and even creating entire code snippets to be […]

Read article
Entenda o que é a NAIC Insurance Data Security Model Law
Cybersecurity

Understanding what the NAIC Insurance Data Security Model Law is

The National Association of Insurance Commissioners (NAIC) is the entity responsible for regulating the insurance industry in the United States, establishing standards and practices that ensure the stability and security of the insurance market. With a sharp rise in digital threats, the NAIC has played an important role in creating guidelines to protect customers’ personal […]

Read article
open source libraries
Cybersecurity

The growing risk of open-source code and libraries

Open-source libraries and free-to-use APIs have been widely adopted by the developer community thanks to their ease of access, flexibility, and collaboration among industry members. These tools provide a wide range of pre-developed functionalities, saving programmers time and effort on their projects. However, the widespread adoption of these resources has also led to an increase […]

Read article
OSINT
Cybersecurity

OSINT: what it is and how cybercriminals are using it

Have you ever heard the term OSINT? Though still largely unrecognized among the lay public, the concept is popular among technology professionals and even government investigative or law enforcement agencies. OSINT is the acronym for Open Source Intelligence, which should provide an initial idea of its meaning. In layman’s terms, OSINT involves using public sources […]

Read article
privileged users
Cybersecurity

How to ensure the security of privileged users

Any employee in any company, without exception, can fall victim to a cyberattack. Cybercriminals target everyone from the “big fish” like CEOs and other members of upper management, to junior professionals – and can even engineer an invasion through the privilege escalation method. However… things are much easier for the bad guys if they can […]

Read article
encrypt files
Cybersecurity

Hands-on! How to easily encrypt files and devices

Now that you’ve learned what cryptography is and understand its importance in keeping sensitive information and data safe, it’s quite normal for questions to pop up: after all, what can I do to incorporate this expertise effectively and actively into my daily routine? Sure, cryptography is already “silently” present in many aspects of our daily […]

Read article
Cryptography
Cybersecurity

Cryptography: the history, what it is, and how to use it

What is the first thing you think of when you hear or read the word “cryptography”? Those somewhat unfamiliar with the concept certainly imagine something extremely complex and technological, employing almost incomprehensible mathematical calculations to make life online safer. What few people know is that this craft is much older than cybersecurity – in fact, […]

Read article
HTTPS
Cybersecurity

HTTPS: Why this alone doesn’t represent enough security

It may seem hard to believe, but there was a time when it was easy to identify whether you were on a secure website or not: all you had to do was check your browser’s address bar for the iconic green padlock, a visual representation that the page was protected by Hyper Text Transfer Protocol […]

Read article
Ransomware
Cybersecurity

Ransomware: How you can help protect your company

Imagine one day you lose access to the critical information required to do your job. Without it, it is impossible to continue, right? This is exactly the position a ransomware attack puts you in when infecting your computer.  Ransomware is a type of malware that hijacks all the data stored on the device once it’s […]

Read article
newsletter

Get the latest news on your email

    Mission accomplished!

    You'll receive new cybersecurity updates in your inbox weekly.

    Follow us on our social media:

    Instagram: @hackerrangers
    LinkedIn: linkedin.com/company/hacker-rangers