Search Results for: IT infrastructure Blog Post COVID‐19 Cyber Threat Coalition – USSS Information Alert May 2, 2020 Criminal groups are exploiting the COVID‐19 pandemic to target healthcare systems and critical IT infrastructure all over the world. The... Blog Post Defense In Depth (DiD): What Is It And Why Is It Important? February 15, 2021 Defense in depth, or DiD, is an information security approach where organizations implement multiple layers of security controls. There will... Blog Post Watch for Cybersecurity Games at the Tokyo Olympics August 10, 2021 Overwhelmed with watching the world’s best push the limits of humanity and represent the pride of their respective countries, it’s... Blog Post Watch Out the Latest Active Ransomware: Maze December 22, 2019 In December, Maze ransomware has gained people’s attention since it was found as the culprit behind several cyberattacks reported recently.... Blog Post Vulnerability Threatens Intel That Leads To Affect Its Users January 13, 2022 A recent Intel security vulnerability allows unauthorized individuals with physical access to exploit and install malware on the chip. The... Blog Post Importance Of Log Policy And Log Retention: What To Log And How Long You Should Keep It? February 12, 2021 Enterprise systems and software generate a plethora of log entries every day for your security team to handle. For instance,... Blog Post What is black box Pentesting? October 28, 2020 Organizations implement a broad range of security measures to maintain a sound security posture. These security measures can be either... Blog Post DOJ & Europol Arrest 150 in Disruption of DarkNet Drug Operation November 24, 2021 International cybercrime sting operation leads to the seizure of weapons, drugs, and $31 million from DarkNet opioid traffickers. Operation Dark... Blog Post Introduction To Black Teaming Exercises January 15, 2021 From startups to enterprises, organizations of all sizes require a structured approach to secure their IT infrastructure. An adequate level... Blog Post Compensatory Security Controls: The Alternative Solution December 18, 2020 In the modern-day threat landscape, organizations cannot sit back and wait for an attack to happen. They need to implement... Blog Post How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous... Blog Post Robinhood Experienced Massive Data Breach Stealing Millions of Customer Names December 3, 2021 More than five million user email addresses and two million customer names were stolen as trading platform Robinhood experienced a... Blog Post APT32 in the Networks of BMW and Hyundai December 21, 2019 APT32 in the Networks of BMW and Hyundai Car as transportation has involved a lot since it was applied in... Blog Post What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT... Blog Post Security Information and Event Management Series Part 3: Main capabilities of SIEM November 2, 2020 In the first part of this four-part series, we covered the need for SIEM solutions and explained the fundamentals. Then,...
Blog Post COVID‐19 Cyber Threat Coalition – USSS Information Alert May 2, 2020 Criminal groups are exploiting the COVID‐19 pandemic to target healthcare systems and critical IT infrastructure all over the world. The...
Blog Post Defense In Depth (DiD): What Is It And Why Is It Important? February 15, 2021 Defense in depth, or DiD, is an information security approach where organizations implement multiple layers of security controls. There will...
Blog Post Watch for Cybersecurity Games at the Tokyo Olympics August 10, 2021 Overwhelmed with watching the world’s best push the limits of humanity and represent the pride of their respective countries, it’s...
Blog Post Watch Out the Latest Active Ransomware: Maze December 22, 2019 In December, Maze ransomware has gained people’s attention since it was found as the culprit behind several cyberattacks reported recently....
Blog Post Vulnerability Threatens Intel That Leads To Affect Its Users January 13, 2022 A recent Intel security vulnerability allows unauthorized individuals with physical access to exploit and install malware on the chip. The...
Blog Post Importance Of Log Policy And Log Retention: What To Log And How Long You Should Keep It? February 12, 2021 Enterprise systems and software generate a plethora of log entries every day for your security team to handle. For instance,...
Blog Post What is black box Pentesting? October 28, 2020 Organizations implement a broad range of security measures to maintain a sound security posture. These security measures can be either...
Blog Post DOJ & Europol Arrest 150 in Disruption of DarkNet Drug Operation November 24, 2021 International cybercrime sting operation leads to the seizure of weapons, drugs, and $31 million from DarkNet opioid traffickers. Operation Dark...
Blog Post Introduction To Black Teaming Exercises January 15, 2021 From startups to enterprises, organizations of all sizes require a structured approach to secure their IT infrastructure. An adequate level...
Blog Post Compensatory Security Controls: The Alternative Solution December 18, 2020 In the modern-day threat landscape, organizations cannot sit back and wait for an attack to happen. They need to implement...
Blog Post How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous...
Blog Post Robinhood Experienced Massive Data Breach Stealing Millions of Customer Names December 3, 2021 More than five million user email addresses and two million customer names were stolen as trading platform Robinhood experienced a...
Blog Post APT32 in the Networks of BMW and Hyundai December 21, 2019 APT32 in the Networks of BMW and Hyundai Car as transportation has involved a lot since it was applied in...
Blog Post What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT...
Blog Post Security Information and Event Management Series Part 3: Main capabilities of SIEM November 2, 2020 In the first part of this four-part series, we covered the need for SIEM solutions and explained the fundamentals. Then,...