Search Results for: New York Times Blog Post Forensics Analysis of the NSO Group’s Pegasus Spyware January 12, 2022 NSO’s Group Pegasus spyware was mentioned multiple times during 2021 in the media. It has been heavily analyzed by organizations... Blog Post US Military Taking Offensive Action Against Ransomware Groups December 22, 2021 The hacking unit of the US Military – Cyber Command has confirmed that it has taken offensive action against ransomware groups responsible... Blog Post What Is The Average Time To Detect Data Breaches And How To Reduce It? November 3, 2020 On this information superhighway we’re on, data has become one of the most sought after and valuable assets. Whether it’s... Blog Post Gang Behind the Us Pipeline Hack Closed the Shop, but the Threat Lives May 21, 2021 The DarkSide cybercriminal group behind the recent ransomware cyberattack on Colonial Pipeline shut down its operation. In the name of... Blog Post What Is Remote Access Trojan and How To Protect Against It? January 25, 2021 Our systems’ existing capabilities to enable remote access have proven to be a game-changer during the ongoing pandemic. Remote access... Blog Post Heavy Increase Of Ryuk Ransomware In The Healthcare Sector October 27, 2020 LIFARS Incident Response Team (LISIRT) is observing a heavy increase in Ryuk Ransomware activity in the healthcare sector, especially in... Blog Post What is Malvertising and How to Protect and Mitigate from it? July 7, 2020 In this cyber threats awareness post we will cover following topics: Malvertising vs Ad Malware How Malware inserted into ads?... Blog Post Apple’s Interception and Scrutiny of iCloud Data On Child Abuse February 24, 2020 Apple has always been known for its secretive policies to protect its users, data and operating system. It has different... Blog Post CISOs Will Need To Invest In Anti-Surveillance Technologies In 2020 December 26, 2019 According to The New York Times, their reporters can even obtain the location data of people through the data set.... Blog Post Baltimore Leaders Ask NSA If Its Work Enabled City’s Hackers May 27, 2019 The New York Times reported that hackers used a tool known as EternalBlue to spread the ransomware through the city’s... Blog Post Attacks on Internet of Things. How to Reduce Cost and Improve Safety of IoT? June 3, 2020 In the world of technology, the term ‘Internet of Things‘, can be any natural or man-made object that has an... Blog Post Impact of 5G network on IoT Security March 11, 2020 The rollout of fifth-generation mobile networks, which offers the potential for download speeds of up to 10 times faster than... Blog Post FBI Alerts of New Ryuk Ransomware Variant July 12, 2019 The Ryuk Ransomware has been hitting US organizations rigorously in recent months. The FBI released a Flash alert alerting that... Blog Post US Launches Cyber Attack Against Iran July 1, 2019 As tensions between Iran and the US peak, the US has begun launching cyber attacks against Iran. A US official... Blog Post What is The Ryuk Ransomware June 7, 2019 Ransomware is a malware attack which takes over a user’s computer and threatens harm, if a payment is not made....
Blog Post Forensics Analysis of the NSO Group’s Pegasus Spyware January 12, 2022 NSO’s Group Pegasus spyware was mentioned multiple times during 2021 in the media. It has been heavily analyzed by organizations...
Blog Post US Military Taking Offensive Action Against Ransomware Groups December 22, 2021 The hacking unit of the US Military – Cyber Command has confirmed that it has taken offensive action against ransomware groups responsible...
Blog Post What Is The Average Time To Detect Data Breaches And How To Reduce It? November 3, 2020 On this information superhighway we’re on, data has become one of the most sought after and valuable assets. Whether it’s...
Blog Post Gang Behind the Us Pipeline Hack Closed the Shop, but the Threat Lives May 21, 2021 The DarkSide cybercriminal group behind the recent ransomware cyberattack on Colonial Pipeline shut down its operation. In the name of...
Blog Post What Is Remote Access Trojan and How To Protect Against It? January 25, 2021 Our systems’ existing capabilities to enable remote access have proven to be a game-changer during the ongoing pandemic. Remote access...
Blog Post Heavy Increase Of Ryuk Ransomware In The Healthcare Sector October 27, 2020 LIFARS Incident Response Team (LISIRT) is observing a heavy increase in Ryuk Ransomware activity in the healthcare sector, especially in...
Blog Post What is Malvertising and How to Protect and Mitigate from it? July 7, 2020 In this cyber threats awareness post we will cover following topics: Malvertising vs Ad Malware How Malware inserted into ads?...
Blog Post Apple’s Interception and Scrutiny of iCloud Data On Child Abuse February 24, 2020 Apple has always been known for its secretive policies to protect its users, data and operating system. It has different...
Blog Post CISOs Will Need To Invest In Anti-Surveillance Technologies In 2020 December 26, 2019 According to The New York Times, their reporters can even obtain the location data of people through the data set....
Blog Post Baltimore Leaders Ask NSA If Its Work Enabled City’s Hackers May 27, 2019 The New York Times reported that hackers used a tool known as EternalBlue to spread the ransomware through the city’s...
Blog Post Attacks on Internet of Things. How to Reduce Cost and Improve Safety of IoT? June 3, 2020 In the world of technology, the term ‘Internet of Things‘, can be any natural or man-made object that has an...
Blog Post Impact of 5G network on IoT Security March 11, 2020 The rollout of fifth-generation mobile networks, which offers the potential for download speeds of up to 10 times faster than...
Blog Post FBI Alerts of New Ryuk Ransomware Variant July 12, 2019 The Ryuk Ransomware has been hitting US organizations rigorously in recent months. The FBI released a Flash alert alerting that...
Blog Post US Launches Cyber Attack Against Iran July 1, 2019 As tensions between Iran and the US peak, the US has begun launching cyber attacks against Iran. A US official...
Blog Post What is The Ryuk Ransomware June 7, 2019 Ransomware is a malware attack which takes over a user’s computer and threatens harm, if a payment is not made....