Cyber Security Blog

Let's start with one of the most pressing questions. What exactly is ransomware? Ransomware is a piece of malicious software designed to infect a computer and then block user access until a ransom is paid. For many years, various ransomware versions have been identified, and most often they try to extort money from victims by showing an on-screen alert. How does ransomware operate? One of the more common tactics used...

Read More

Data Leaks A data leak occurs when sensitive data is accidentally exposed, either electronically or physically. Internal data breaches are possible, as are physical data leaks from external hard drives or laptops. If a cyber-criminal discovers a data leak, the knowledge might be used to prepare for a data breach assault. Personally Identifiable Information (PII), such as names, contact information, and financial information, is The Holy Grail of...

Read More

Business Email compromise   We've all heard that malicious actors are actively exploiting e-mail scams to swindle government agencies, small and large organizations, and their victims are old news. Most corporate financial transactions have now moved to digital, and this resulted in a rise in financial crime caused mainly by cyber fraud.   The phrase "Company Email Compromise" refers to a wide range of malicious activities, but all kinds...

Read More

CyberArrow Invited to Participate as 1 out of 9 Promising Startups Globally in the Esteemed HITB + Cyber Week Startup Village Held in Abu Dhabi in November 2021   We are excited to share with you all that CyberArrow has been selected as one of the top startups to participate in the elite HITB Conference and Cyber Week which is currently ongoing in Abu Dhabi (21st -25th...

Read More

Today, we’re changing our name from EBDAA to CyberArrow.   Our customers need us for more than innovative cyber security services, and this is why we’re now enabling them to automate risk, awareness and business continuity activities without increasing the complexity.   For you, as our customer, not much will change, as we’ve made sure that this transition will be as smooth as possible. We become CyberArrow and you...

Read More

You may have heard of a cybersecurity framework – or several, actually – being adopted by large organizations (businesses, NGOs and other entities) or by state actors. But what is a cybersecurity framework, why are there several such frameworks and how do they work?   We’ll answer all these questions and more in the following guide. We noticed that the info on cybersecurity frameworks available online is...

Read More