Search Results for: Malicious programs Blog Post What Is Remote Access Trojan and How To Protect Against It? January 25, 2021 Our systems’ existing capabilities to enable remote access have proven to be a game-changer during the ongoing pandemic. Remote access... Blog Post TangleBot Poses Harm To Android Users in US and Canada October 22, 2021 As hackers continue to take advantage of the recent pandemic, cybersecurity experts have found a new SMS smishing virus. Dubbed... Blog Post Common Techniques by Which Malware Makes Itself Persistent January 19, 2021 A hacker wants to keep its malware to stay on the target device, even when the operating system restarts. Do you know... Blog Post Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every... Blog Post Sodinokibi Ransomware May 20, 2020 What is Sodinokibi? Sodinokibi Ransomware is also known as REvil or Sodin, discovered by S!Ri. It is a ransomware-type program... Blog Post How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... Blog Post What are the differences between Static, Dynamic and Hybrid Malware Analysis? November 4, 2020 In 2019, 114 million new malware applications were detected. 43 million new threats were already picked up in the first... Knowledge Center Defend against Ransomware: Controlled Folder Access January 25, 2020 Ransomware has been a significant and serious threat to organizations. A successful attack not only causes a monetary loss but... Blog Post U.S. DoJ Charges Two Chinese Hackers for Stealing COVID-19 Research and Trade Secrets August 3, 2020 This past week, the U.S. Department of Justice (DoJ) revealed charges against two Chinese nationals. These charges related to their... Blog Post Understanding & Integrating Cyber Security Risks into A Risk Management Program January 15, 2020 Cybersecurity is a field that protects the confidentiality, integrity, and availability of digital information. We are now at... Blog Post Types of Malware March 6, 2020 Malware is a potential term to define a malicious code written to perform mysterious actions on the target system. Malware... Blog Post The Need for Cyber Incident Response April 1, 2020 It is essential that every organization is prepared for the worst. Hence the key to handle such a situation is... Blog Post WhatsApp Disclosed 12 Security Vulnerabilities in 2019 January 31, 2020 Most popular App WhatsApp, which is now owned by Facebook, boasts end-to-end High-level data security, disclosed 12 vulnerabilities in 2019... Blog Post Threat Actors Exploitation of COVID-19 Pandemic – FBI Alert May 2, 2020 The FBI’s Weapons of Mass Destruction Directorate in coordination with the Office of Private Sector is providing this LIR to... Blog Post VPN Security is Highlighted With Everyone Working From Home March 22, 2020 The Internet is indeed a wonderful invention, but as we all know, risks can be hidden everywhere on the Internet....
Blog Post What Is Remote Access Trojan and How To Protect Against It? January 25, 2021 Our systems’ existing capabilities to enable remote access have proven to be a game-changer during the ongoing pandemic. Remote access...
Blog Post TangleBot Poses Harm To Android Users in US and Canada October 22, 2021 As hackers continue to take advantage of the recent pandemic, cybersecurity experts have found a new SMS smishing virus. Dubbed...
Blog Post Common Techniques by Which Malware Makes Itself Persistent January 19, 2021 A hacker wants to keep its malware to stay on the target device, even when the operating system restarts. Do you know...
Blog Post Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every...
Blog Post Sodinokibi Ransomware May 20, 2020 What is Sodinokibi? Sodinokibi Ransomware is also known as REvil or Sodin, discovered by S!Ri. It is a ransomware-type program...
Blog Post How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place....
Blog Post What are the differences between Static, Dynamic and Hybrid Malware Analysis? November 4, 2020 In 2019, 114 million new malware applications were detected. 43 million new threats were already picked up in the first...
Knowledge Center Defend against Ransomware: Controlled Folder Access January 25, 2020 Ransomware has been a significant and serious threat to organizations. A successful attack not only causes a monetary loss but...
Blog Post U.S. DoJ Charges Two Chinese Hackers for Stealing COVID-19 Research and Trade Secrets August 3, 2020 This past week, the U.S. Department of Justice (DoJ) revealed charges against two Chinese nationals. These charges related to their...
Blog Post Understanding & Integrating Cyber Security Risks into A Risk Management Program January 15, 2020 Cybersecurity is a field that protects the confidentiality, integrity, and availability of digital information. We are now at...
Blog Post Types of Malware March 6, 2020 Malware is a potential term to define a malicious code written to perform mysterious actions on the target system. Malware...
Blog Post The Need for Cyber Incident Response April 1, 2020 It is essential that every organization is prepared for the worst. Hence the key to handle such a situation is...
Blog Post WhatsApp Disclosed 12 Security Vulnerabilities in 2019 January 31, 2020 Most popular App WhatsApp, which is now owned by Facebook, boasts end-to-end High-level data security, disclosed 12 vulnerabilities in 2019...
Blog Post Threat Actors Exploitation of COVID-19 Pandemic – FBI Alert May 2, 2020 The FBI’s Weapons of Mass Destruction Directorate in coordination with the Office of Private Sector is providing this LIR to...
Blog Post VPN Security is Highlighted With Everyone Working From Home March 22, 2020 The Internet is indeed a wonderful invention, but as we all know, risks can be hidden everywhere on the Internet....