
Cyber Security Blog

Too Much Security — Revolut’s Case
Human factor in security needs to be balanced. Never removed but also not overused. In this article we’ll look closer at Revolut
Latest Articles
Hello world!
Welcome to WordPress. This is your first post. Edit or delete it, then start writing!

Deciphering the 403 HTTP Error: Forbidden Access
As you navigate the vast realm of the internet, you may come across various HTTP error codes, and one of the most intriguing ones is

Demystifying the 402 HTTP Error: Payment Required
While navigating the web, you might occasionally stumble upon various HTTP error codes, and one of the less common but intriguing ones is the “402

Understanding the 401 HTTP Error: Unauthorized Access
The internet is filled with various HTTP error codes, and one that you might have encountered is the “401 Unauthorized” error. In this article, we’ll

Unraveling the 400 HTTP Error: What It Means and How to Handle It
When browsing the internet, you may have come across the cryptic “400 Bad Request” error message. This error can be frustrating, but fear not; we’re

How to Spy on People on iOS
Bizzare behaviour of iOS browsers in treating keyloggers. TL;DR: How to conveniently run keyloggers in operating systems like iOS (but not Android); In this article I’m

We Turned Down €3M Buyout to Build a Cybersec of the Future
It’s not good to be a millionaire (sometimes) I’m writing it down in November 2022. True crisis is looming over the horizon and is about
Editor's Pick
24/7 Monitoring Services
What Do You Get?
- Instant alerts – when your servers are down
- Traffic analysis – good vs bad (bots, crawlers etc.)
- Smart insights and analytics about your audience
- Regular Cybersec audits of your website
- Weekly email summary about your traffic and servers
- no credit cards required to become a free-tier user