Search Results for: Digital Signatures Blog Post What Is Hash Function? What Is It Used For and Why Is It Important? February 5, 2021 In the world of information technology and cybersecurity the term “hash”, or “hash function” appears abundantly. Hundreds of hashing algorithms... Blog Post Digital Signatures – What Are They and How Do They Work? June 22, 2020 A Digital Signature is a type of signature that guarantees that the contents of a message have not been altered... Blog Post What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an... Blog Post Organizing Cyber Security Risks in a Company January 5, 2020 Looking Back 5 Years, Looking Forward 5 Years in our Digitally Connected World In the past five years, we have... Blog Post The Scariest Cybersecurity Issues In Last 10 Months November 14, 2019 It is November now, and it means it has been 10 months since 2019 starts. In the past 10 months,... Blog Post Threat Hunting vs Digital Forensics – What Are They? Do You Need Both? May 24, 2021 Threat hunting and digital forensics are just two of the cogs in a robust and multifaceted security machine. However, there... Blog Post Hackers Hit Major Russian Bank in an Online Heist July 23, 2018 Hackers have stolen nearly $1 million from a Russian bank after breaching its network by targeting an outdated router at... Blog Post Current Tools and Techniques in Digital Forensics February 17, 2021 Digital forensics leverages specialized techniques and tools to investigate various forms of computer-related crimes. Digital crimes may include network intrusion,... Blog Post LIFARS Alert Flashback and Update: North Korean Trojan KEYMARBLE August 18, 2021 This blog revisits the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) 2018 press release regarding... Blog Post Researchers Discover 119 Meltdown, Spectre Malware Variants in the Wild February 1, 2018 Hundreds of malware samples that have taken advantage of the proof-of-concept (PoC) code for the infamous, widespread Meltdown and Spectre... Blog Post Network Intrusion – Detection and Prevention May 13, 2020 Network intrusion refers to any unauthorized activity on a digital network. Network intrusions often involve stealing valuable network resources and... Blog Post How to Remove Ranzy Ransomware? April 28, 2021 Ranzy is simply a ransomware-as-a-service (RaaS) offering. It is usually through email payloads get distributed. Simultaneously, some reports have also... Blog Post SecurityScorecard Discovers new botnet, ‘Zhadnost,’ responsible for Ukraine DDoS attacks March 10, 2022 Executive Summary SecurityScorecard (SSC) has identified three separate DDoS attacks which all targeted Ukrainian government and financial websites leading up... Blog Post How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... Blog Post What are the differences between Static, Dynamic and Hybrid Malware Analysis? November 4, 2020 In 2019, 114 million new malware applications were detected. 43 million new threats were already picked up in the first...
Blog Post What Is Hash Function? What Is It Used For and Why Is It Important? February 5, 2021 In the world of information technology and cybersecurity the term “hash”, or “hash function” appears abundantly. Hundreds of hashing algorithms...
Blog Post Digital Signatures – What Are They and How Do They Work? June 22, 2020 A Digital Signature is a type of signature that guarantees that the contents of a message have not been altered...
Blog Post What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an...
Blog Post Organizing Cyber Security Risks in a Company January 5, 2020 Looking Back 5 Years, Looking Forward 5 Years in our Digitally Connected World In the past five years, we have...
Blog Post The Scariest Cybersecurity Issues In Last 10 Months November 14, 2019 It is November now, and it means it has been 10 months since 2019 starts. In the past 10 months,...
Blog Post Threat Hunting vs Digital Forensics – What Are They? Do You Need Both? May 24, 2021 Threat hunting and digital forensics are just two of the cogs in a robust and multifaceted security machine. However, there...
Blog Post Hackers Hit Major Russian Bank in an Online Heist July 23, 2018 Hackers have stolen nearly $1 million from a Russian bank after breaching its network by targeting an outdated router at...
Blog Post Current Tools and Techniques in Digital Forensics February 17, 2021 Digital forensics leverages specialized techniques and tools to investigate various forms of computer-related crimes. Digital crimes may include network intrusion,...
Blog Post LIFARS Alert Flashback and Update: North Korean Trojan KEYMARBLE August 18, 2021 This blog revisits the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) 2018 press release regarding...
Blog Post Researchers Discover 119 Meltdown, Spectre Malware Variants in the Wild February 1, 2018 Hundreds of malware samples that have taken advantage of the proof-of-concept (PoC) code for the infamous, widespread Meltdown and Spectre...
Blog Post Network Intrusion – Detection and Prevention May 13, 2020 Network intrusion refers to any unauthorized activity on a digital network. Network intrusions often involve stealing valuable network resources and...
Blog Post How to Remove Ranzy Ransomware? April 28, 2021 Ranzy is simply a ransomware-as-a-service (RaaS) offering. It is usually through email payloads get distributed. Simultaneously, some reports have also...
Blog Post SecurityScorecard Discovers new botnet, ‘Zhadnost,’ responsible for Ukraine DDoS attacks March 10, 2022 Executive Summary SecurityScorecard (SSC) has identified three separate DDoS attacks which all targeted Ukrainian government and financial websites leading up...
Blog Post How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place....
Blog Post What are the differences between Static, Dynamic and Hybrid Malware Analysis? November 4, 2020 In 2019, 114 million new malware applications were detected. 43 million new threats were already picked up in the first...