Threat intelligence is curated information about an existing or emerging cyberthreat that can be distributed for the purpose of improving defences against a specific attack. Going beyond IP addresses, hashes, and other core threat identifiers, threat intelligence provides critical context around a threat activity, including indicators of compromise (IoC), indicators of attack (IoA), the tactics employed, and, potentially, the motivation and identity of the adversary. There are many ways to derive value out of threat intelligence, whether it be through a full threat intelligence platform, ingesting threat feeds, or simply leveraging threat intelligence features found in common security tools.
This category contains the advertising cookie that is set by Google, when embeding one of its services. CYNET embeds a Google Map, showing its location in the Homepage and in Contact sections. The cookies that are set are the following:
NID
This website uses Google Analytics (with IP Anonymization) in order to track the visitor’s performance. The cookies that are set by the service are the following:
_ga
_gat
_gid
This category contains all the cookies that are closely related to the functionality of the Website, such as the prefered language, whether the user has read and/or accepted the Cookie Consent in the various categories.
The following cookies are set:
pll_language
viewed_cookie_policy
cookielawinfo-checkbox-preferences
cookielawinfo-checkbox-advertisement