Search Results for: attacker Blog Post Attackers Exploiting Companies That Use Advanced VPNs November 19, 2021 Virtual Private Networks (VPNs) have long been an essential part in the operation of modern businesses. They have recently become... Blog Post CISA Director: Attackers Targeted Port of Houston October 19, 2021 According to a joint security alert issued by the Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and the Coast... Blog Post Data Breach: Attackers Breached Systems of United Nations October 4, 2021 As the shocking news recently emerged that hackers breached the computer networks of the United Nations, it sent shockwaves across... Blog Post SolarWinds Attacker Targets Cloud Service Providers in New Supply Chain Threat December 9, 2021 Earlier this year, a supply chain attack targeted at Solarwinds customers rocked the cybersecurity industry, implicating big tech as well... Blog Post Top Techniques Used by Attackers to Bypass MFA August 25, 2021 Many consider MFA (multi-factor authentication) as one of the critical security defenses against malicious cyberattacks, and rightly so. Even a... Blog Post Cyber Attackers Using Google Chrome to Steal User Data and Credentials November 17, 2021 With Windows’s User Account Control (UAC), malware is exceedingly difficult to spread since UAC runs all apps in the non-administrative... Blog Post How to Keep Attackers Out of Your VPN – According to the Feds October 29, 2021 In recent years, there has been an uptick in concern regarding cyberattacks by nation-state actors, particularly from countries like China,... Blog Post Ransomware Attacker Offers Employees a Cut if They Install DemonWare on Their Organization’s Systems September 30, 2021 It may seem impossible to think that your employees or peers could knowingly compromise the security of your business. However,... Blog Post Should I Pay the Ransom? How to Negotiate with Attackers? May 18, 2021 Should I pay the ransom? In the age of cyber warfare, the question is too frequent to ask; however, it... Blog Post What Is Remote Access Trojan and How To Protect Against It? January 25, 2021 Our systems’ existing capabilities to enable remote access have proven to be a game-changer during the ongoing pandemic. Remote access... Blog Post Microsoft Teams vulnerability could let attackers hijack user accounts April 28, 2020 Microsoft has issued an emergency patch to all versions of Windows in order to patch a vulnerability revealed after the recent Hacking Team breach. Blog Post Ransomware Gangs Now Calling And Emailing Victims February 15, 2022 It seems like the days of short and clear threat messages are slowly becoming old-fashioned, as ransomware gangs are becoming... Blog Post ZoomBombing?! How Can You Protect Your Zoom Meeting from Attackers? March 31, 2020 During the epidemic, many people used video conferencing programs to communicate with friends and relatives or assist with Work From... Blog Post Zero-day in IE Exploited by Attackers, warned Microsoft January 23, 2020 Not only Microsoft but also the Department of Homeland Security (DHS) Cybersecurity & Infrastructure Security Agency (CISA), warned that... Blog Post The Implementation of HTTP/2 May be Exposing Websites to Risk September 7, 2021 James Kettle – director of research at PortSwigger – demonstrated at BlackHat 2021 how attackers can exploit current practices surrounding...
Blog Post Attackers Exploiting Companies That Use Advanced VPNs November 19, 2021 Virtual Private Networks (VPNs) have long been an essential part in the operation of modern businesses. They have recently become...
Blog Post CISA Director: Attackers Targeted Port of Houston October 19, 2021 According to a joint security alert issued by the Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and the Coast...
Blog Post Data Breach: Attackers Breached Systems of United Nations October 4, 2021 As the shocking news recently emerged that hackers breached the computer networks of the United Nations, it sent shockwaves across...
Blog Post SolarWinds Attacker Targets Cloud Service Providers in New Supply Chain Threat December 9, 2021 Earlier this year, a supply chain attack targeted at Solarwinds customers rocked the cybersecurity industry, implicating big tech as well...
Blog Post Top Techniques Used by Attackers to Bypass MFA August 25, 2021 Many consider MFA (multi-factor authentication) as one of the critical security defenses against malicious cyberattacks, and rightly so. Even a...
Blog Post Cyber Attackers Using Google Chrome to Steal User Data and Credentials November 17, 2021 With Windows’s User Account Control (UAC), malware is exceedingly difficult to spread since UAC runs all apps in the non-administrative...
Blog Post How to Keep Attackers Out of Your VPN – According to the Feds October 29, 2021 In recent years, there has been an uptick in concern regarding cyberattacks by nation-state actors, particularly from countries like China,...
Blog Post Ransomware Attacker Offers Employees a Cut if They Install DemonWare on Their Organization’s Systems September 30, 2021 It may seem impossible to think that your employees or peers could knowingly compromise the security of your business. However,...
Blog Post Should I Pay the Ransom? How to Negotiate with Attackers? May 18, 2021 Should I pay the ransom? In the age of cyber warfare, the question is too frequent to ask; however, it...
Blog Post What Is Remote Access Trojan and How To Protect Against It? January 25, 2021 Our systems’ existing capabilities to enable remote access have proven to be a game-changer during the ongoing pandemic. Remote access...
Blog Post Microsoft Teams vulnerability could let attackers hijack user accounts April 28, 2020 Microsoft has issued an emergency patch to all versions of Windows in order to patch a vulnerability revealed after the recent Hacking Team breach.
Blog Post Ransomware Gangs Now Calling And Emailing Victims February 15, 2022 It seems like the days of short and clear threat messages are slowly becoming old-fashioned, as ransomware gangs are becoming...
Blog Post ZoomBombing?! How Can You Protect Your Zoom Meeting from Attackers? March 31, 2020 During the epidemic, many people used video conferencing programs to communicate with friends and relatives or assist with Work From...
Blog Post Zero-day in IE Exploited by Attackers, warned Microsoft January 23, 2020 Not only Microsoft but also the Department of Homeland Security (DHS) Cybersecurity & Infrastructure Security Agency (CISA), warned that...
Blog Post The Implementation of HTTP/2 May be Exposing Websites to Risk September 7, 2021 James Kettle – director of research at PortSwigger – demonstrated at BlackHat 2021 how attackers can exploit current practices surrounding...