Search Results for: IT Administrators Knowledge Center Wi-Fi Network Penetration Testing with a Synopsis of Ontology to Enhance the Security March 2, 2022 Most use the internet to send messages or documents (data) from point (A) to point (B). This is mainly done... Blog Post The Colonial Pipeline – DarkSide Ransomware Attack May 11, 2021 Last week, the United States experienced one of the most significant cyber-attacks in its history. The Department of Homeland Security... Knowledge Center LIFARS Cybersecurity Essentials Guide – Recommendations for Law Enforcement February 28, 2020 Cybersecurity Essentials Guide For Law Enforcement. Basic cyber security practices – personnel. There are basic cyber hygiene practices that should... Blog Post Details of Critical VMware Vulnerabilities April 22, 2020 VMware patched a security vulnerability related to vCenter Server last week. This security vulnerability numbered CVE-2020-3952 is located in VMware... Blog Post USB Sticks Can Cause Cyber Security Breaches December 28, 2019 Were you ever bringing in a USB Drive from home and then plugging it back into your work computer? This... Blog Post Ransomware Struck: Now What? December 30, 2019 Note: our stance is the same as the FBI’s and we advise against paying a ransom as there is no... Blog Post Benefits and Drawbacks of Using LAPS in Active Directory February 22, 2021 What is LAPS in Active Directory? The term LAPS stands for Local Administrator Password Solution. LAPS acts as a password... Blog Post LIFARS Alert Flashback and Update: North Korean Trojan KEYMARBLE August 18, 2021 This blog revisits the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) 2018 press release regarding... Blog Post Vulnerabilities Found in U.S Ballistic Missiles Systems December 18, 2018 After a security audit by the Department of Defense Inspector General multiple cybersecurity flaws in U.S Ballistic Missile Defense Systems... Blog Post How Fake Accounts and Sneaker-Bots Took Over the Internet September 3, 2021 If you’ve used any form of social media before, you have run into fake accounts with less-than-noble intentions. Usually, these... Blog Post Cross Section of the Conti Ransomware Attack and its TTPs May 10, 2021 The first mention of Conti ransomware is from May 2020. It is characterized by its rapid spread to systems and... Blog Post The Lorenz Ransomware Gang Demand High Ransoms June 25, 2021 The Lorenz Gang Over the past few months, the Lorenz ransomware threat (the encryptor is believed to be the same... Blog Post How to Use Sysinternals for Cyber Security June 24, 2021 Sysinternals is a free suite of cybersecurity tools for Windows users that help you manage, troubleshoot, and diagnose your Windows... Knowledge Center Guide to Hardening Windows 10 November 3, 2020 Introduction Windows 10 is the most widely used desktop operating system in enterprise environment. It features extensive security policies, allowing... Blog Post How To Lower The Risks Of Privileged Users Compromise? December 16, 2020 Whenever an attacker compromises an appliance, one of his first steps is to collect all the credentials he can find...
Knowledge Center Wi-Fi Network Penetration Testing with a Synopsis of Ontology to Enhance the Security March 2, 2022 Most use the internet to send messages or documents (data) from point (A) to point (B). This is mainly done...
Blog Post The Colonial Pipeline – DarkSide Ransomware Attack May 11, 2021 Last week, the United States experienced one of the most significant cyber-attacks in its history. The Department of Homeland Security...
Knowledge Center LIFARS Cybersecurity Essentials Guide – Recommendations for Law Enforcement February 28, 2020 Cybersecurity Essentials Guide For Law Enforcement. Basic cyber security practices – personnel. There are basic cyber hygiene practices that should...
Blog Post Details of Critical VMware Vulnerabilities April 22, 2020 VMware patched a security vulnerability related to vCenter Server last week. This security vulnerability numbered CVE-2020-3952 is located in VMware...
Blog Post USB Sticks Can Cause Cyber Security Breaches December 28, 2019 Were you ever bringing in a USB Drive from home and then plugging it back into your work computer? This...
Blog Post Ransomware Struck: Now What? December 30, 2019 Note: our stance is the same as the FBI’s and we advise against paying a ransom as there is no...
Blog Post Benefits and Drawbacks of Using LAPS in Active Directory February 22, 2021 What is LAPS in Active Directory? The term LAPS stands for Local Administrator Password Solution. LAPS acts as a password...
Blog Post LIFARS Alert Flashback and Update: North Korean Trojan KEYMARBLE August 18, 2021 This blog revisits the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) 2018 press release regarding...
Blog Post Vulnerabilities Found in U.S Ballistic Missiles Systems December 18, 2018 After a security audit by the Department of Defense Inspector General multiple cybersecurity flaws in U.S Ballistic Missile Defense Systems...
Blog Post How Fake Accounts and Sneaker-Bots Took Over the Internet September 3, 2021 If you’ve used any form of social media before, you have run into fake accounts with less-than-noble intentions. Usually, these...
Blog Post Cross Section of the Conti Ransomware Attack and its TTPs May 10, 2021 The first mention of Conti ransomware is from May 2020. It is characterized by its rapid spread to systems and...
Blog Post The Lorenz Ransomware Gang Demand High Ransoms June 25, 2021 The Lorenz Gang Over the past few months, the Lorenz ransomware threat (the encryptor is believed to be the same...
Blog Post How to Use Sysinternals for Cyber Security June 24, 2021 Sysinternals is a free suite of cybersecurity tools for Windows users that help you manage, troubleshoot, and diagnose your Windows...
Knowledge Center Guide to Hardening Windows 10 November 3, 2020 Introduction Windows 10 is the most widely used desktop operating system in enterprise environment. It features extensive security policies, allowing...
Blog Post How To Lower The Risks Of Privileged Users Compromise? December 16, 2020 Whenever an attacker compromises an appliance, one of his first steps is to collect all the credentials he can find...