Blog

Data Leaks A data leak occurs when sensitive data is accidentally exposed, either electronically or physically. Internal data breaches are possible, as are physical data leaks from external hard drives or laptops. If a cyber-criminal discovers a data leak, the knowledge might be used to prepare for a data breach assault. Personally Identifiable Information (PII), such as names, contact information, and financial information, is The Holy Grail of...

Read More

Business Email compromise   We've all heard that malicious actors are actively exploiting e-mail scams to swindle government agencies, small and large organizations, and their victims are old news. Most corporate financial transactions have now moved to digital, and this resulted in a rise in financial crime caused mainly by cyber fraud.   The phrase "Company Email Compromise" refers to a wide range of malicious activities, but all kinds...

Read More

CyberArrow Invited to Participate as 1 out of 9 Promising Startups Globally in the Esteemed HITB + Cyber Week Startup Village Held in Abu Dhabi in November 2021   We are excited to share with you all that CyberArrow has been selected as one of the top startups to participate in the elite HITB Conference and Cyber Week which is currently ongoing in Abu Dhabi (21st -25th...

Read More

Today, we’re changing our name from EBDAA to CyberArrow.   Our customers need us for more than innovative cyber security services, and this is why we’re now enabling them to automate risk, awareness and business continuity activities without increasing the complexity.   For you, as our customer, not much will change, as we’ve made sure that this transition will be as smooth as possible. We become CyberArrow and you...

Read More

You may have heard of a cybersecurity framework – or several, actually – being adopted by large organizations (businesses, NGOs and other entities) or by state actors. But what is a cybersecurity framework, why are there several such frameworks and how do they work?   We’ll answer all these questions and more in the following guide. We noticed that the info on cybersecurity frameworks available online is...

Read More

  Pentesting is the science, know-how and art of finding security vulnerabilities (penetration vulnerabilities) in software and IT networks. When not done by professional pentesting companies, it’s better known as hacking. The last term may seem a bit harsh, but it’s the best way to describe the processes of identifying weak spots in an information system.   Of course, when not done maliciously, the activity is labeled as...

Read More