Search Results for: USB Blog Post USB Sticks Can Cause Cyber Security Breaches December 28, 2019 Were you ever bringing in a USB Drive from home and then plugging it back into your work computer? This... Knowledge Center Vjw0rm Worm/RAT September 17, 2021 Vjw0rm is a worm that usually spreads via USB drives. It’s also classified as a RAT because it executes commands received... Blog Post Former Student Destroys University Computers Using A USB Killer April 25, 2019 A former student at the College of Saint Rose destroyed at least 66 University computers using a USB Killer. The... Blog Post LIFARS Alert Flashback and Update: North Korean Trojan KEYMARBLE August 18, 2021 This blog revisits the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) 2018 press release regarding... Blog Post Acquisition of Digital Evidence for Forensic Investigation May 28, 2021 The way of collecting digital forensic evidence is very important. The evidence in this area is volatile and delicate. It... Blog Post What To Look For When Selecting a DLP Solution For Your Business? June 1, 2021 According to IBM, the average data breach cost organization’s an average of $3.86 million per incident. However, organizations are only... Blog Post How Ready Are You for a Ransomware Attack? September 8, 2021 Ransomware seems to be an ever-present threat to our cybersecurity with new high-profile attacks occurring all too often. This leads... Blog Post Root CA Security Best Practices for Ensuring Trusted and Compliant Interactions April 19, 2021 Your certification authority (CA) is a key component in securing your network. It is the entity that issues, manages, and... Blog Post Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge.... Knowledge Center Windows ShellBags Forensics, Investigative Value of Windows ShellBags April 2, 2020 Windows ShellBags are one of the well-known and valuable sources of information regarding computer system’s user behavior. Although their primary... Blog Post Key Cyber Risks and Threats June 1, 2020 No matter how small your business is, there should be an awareness and basic understanding of the threats posed in... Blog Post Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username... Blog Post Cybersecurity In The Industrial Sector February 19, 2020 With the rapid development of industrial informatization and the arrival of the IoT, the integration trend of industrialization and informatization... Blog Post Schneider Electric Warns Customers Over Malware-Infected USB Drives September 10, 2018 Schneider Electric has issued a consumer warning that USB drives shipped to consumers could be infected with malware, potentially. The... Blog Post Current Tools and Techniques in Digital Forensics February 17, 2021 Digital forensics leverages specialized techniques and tools to investigate various forms of computer-related crimes. Digital crimes may include network intrusion,...
Blog Post USB Sticks Can Cause Cyber Security Breaches December 28, 2019 Were you ever bringing in a USB Drive from home and then plugging it back into your work computer? This...
Knowledge Center Vjw0rm Worm/RAT September 17, 2021 Vjw0rm is a worm that usually spreads via USB drives. It’s also classified as a RAT because it executes commands received...
Blog Post Former Student Destroys University Computers Using A USB Killer April 25, 2019 A former student at the College of Saint Rose destroyed at least 66 University computers using a USB Killer. The...
Blog Post LIFARS Alert Flashback and Update: North Korean Trojan KEYMARBLE August 18, 2021 This blog revisits the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) 2018 press release regarding...
Blog Post Acquisition of Digital Evidence for Forensic Investigation May 28, 2021 The way of collecting digital forensic evidence is very important. The evidence in this area is volatile and delicate. It...
Blog Post What To Look For When Selecting a DLP Solution For Your Business? June 1, 2021 According to IBM, the average data breach cost organization’s an average of $3.86 million per incident. However, organizations are only...
Blog Post How Ready Are You for a Ransomware Attack? September 8, 2021 Ransomware seems to be an ever-present threat to our cybersecurity with new high-profile attacks occurring all too often. This leads...
Blog Post Root CA Security Best Practices for Ensuring Trusted and Compliant Interactions April 19, 2021 Your certification authority (CA) is a key component in securing your network. It is the entity that issues, manages, and...
Blog Post Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge....
Knowledge Center Windows ShellBags Forensics, Investigative Value of Windows ShellBags April 2, 2020 Windows ShellBags are one of the well-known and valuable sources of information regarding computer system’s user behavior. Although their primary...
Blog Post Key Cyber Risks and Threats June 1, 2020 No matter how small your business is, there should be an awareness and basic understanding of the threats posed in...
Blog Post Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username...
Blog Post Cybersecurity In The Industrial Sector February 19, 2020 With the rapid development of industrial informatization and the arrival of the IoT, the integration trend of industrialization and informatization...
Blog Post Schneider Electric Warns Customers Over Malware-Infected USB Drives September 10, 2018 Schneider Electric has issued a consumer warning that USB drives shipped to consumers could be infected with malware, potentially. The...
Blog Post Current Tools and Techniques in Digital Forensics February 17, 2021 Digital forensics leverages specialized techniques and tools to investigate various forms of computer-related crimes. Digital crimes may include network intrusion,...