Search Results for: brute force attacks Blog Post Even Fortune 500 Companies Are On the Wavelength of Poor Password Hygiene January 4, 2022 Even Fortune 500 companies do not use secure passwords when it is common knowledge that passwords are the first line... Blog Post Kaspersky: RDP Brute Force Attack Attacks Rise May 5, 2020 Kaspersky recently warned that hackers have aggressively attacked the Remote Desktop Protocol (RDP) through brute force methods because of the... Blog Post Security Through Obscurity November 13, 2020 Keeping an organization’s systems secure is the primary objective of its security team. Security teams implement various measures to achieve... Blog Post Types of Password Attacks April 27, 2020 In the world of the internet, millions of User accounts are created every day and so are their passwords, being... Blog Post Clubhouse Part 1: Does Exclusivity Imply Security? A Look Under the Hood of Clubhouse Authentication February 23, 2021 In this two-part blog post series, we will look at security aspects of the Clubhouse app. Security in the world... Blog Post NSA and CISA Warn About Russian GRU Brute-Force Cyberattacks against US, Global Organizations August 3, 2021 Recently, top US security agencies warn about the wave of brute-force cyberattacks by the Russian military intelligence agency named GRU.... Knowledge Center REvil Sodinokibi Ransomware September 23, 2020 Overview During a recent client engagement, the LIFARS DFIR team encountered the REvil/Sodinokibi Ransomware group. The typical attack vector chosen... Blog Post How to Secure Windows Remote Desktop Protocol (RDP) in 12 Steps June 10, 2021 As our working environments become increasingly orientated towards remote or hybrid paradigms, so does our reliance on remote technologies such... Blog Post Ransomware Gangs Now Threatening to Leak Valuable Information as Part of New Strategy February 11, 2021 Ransomware gangs are shaking up their tactics in the hopes of applying increasing pressure on companies and boosting their payday.... Blog Post COVID-19 Outbreak in France Leads to Ransomware Attacks March 26, 2020 The increase of ransomware attacks in France has drawn serious government attention. Due to the global fear of the deadly... Blog Post WordPress Plugin Vulnerability Can Wipe Any Site Clean November 30, 2021 A new WordPress plugin vulnerability was identified in Hashthemes Demo Importer. Said plugin is a popular choice among web developers.... Blog Post 10 Ransomware Strains by Advanced Cyber Gangs June 5, 2020 With the Coronavirus pandemic, healthcare organizations, their suppliers, government agencies, and educational software providers have been targeted by cyber criminal... Blog Post Can Cars Get Hacked? July 3, 2020 The demand for connected-cars has been rising and most of the connected-cars have been sold to customers. A connected car... Blog Post Be Aware of Bluetooth Attack May 1, 2020 Nowadays, there are various Bluetooth headsets, Bluetooth bracelets, car Bluetooth and so on. Since the advent of Bluetooth technology, it... Blog Post Understanding Authentication April 29, 2020 Authentication is the process of recognizing a user’s identity. It is the mechanism of associating an incoming request with a...
Blog Post Even Fortune 500 Companies Are On the Wavelength of Poor Password Hygiene January 4, 2022 Even Fortune 500 companies do not use secure passwords when it is common knowledge that passwords are the first line...
Blog Post Kaspersky: RDP Brute Force Attack Attacks Rise May 5, 2020 Kaspersky recently warned that hackers have aggressively attacked the Remote Desktop Protocol (RDP) through brute force methods because of the...
Blog Post Security Through Obscurity November 13, 2020 Keeping an organization’s systems secure is the primary objective of its security team. Security teams implement various measures to achieve...
Blog Post Types of Password Attacks April 27, 2020 In the world of the internet, millions of User accounts are created every day and so are their passwords, being...
Blog Post Clubhouse Part 1: Does Exclusivity Imply Security? A Look Under the Hood of Clubhouse Authentication February 23, 2021 In this two-part blog post series, we will look at security aspects of the Clubhouse app. Security in the world...
Blog Post NSA and CISA Warn About Russian GRU Brute-Force Cyberattacks against US, Global Organizations August 3, 2021 Recently, top US security agencies warn about the wave of brute-force cyberattacks by the Russian military intelligence agency named GRU....
Knowledge Center REvil Sodinokibi Ransomware September 23, 2020 Overview During a recent client engagement, the LIFARS DFIR team encountered the REvil/Sodinokibi Ransomware group. The typical attack vector chosen...
Blog Post How to Secure Windows Remote Desktop Protocol (RDP) in 12 Steps June 10, 2021 As our working environments become increasingly orientated towards remote or hybrid paradigms, so does our reliance on remote technologies such...
Blog Post Ransomware Gangs Now Threatening to Leak Valuable Information as Part of New Strategy February 11, 2021 Ransomware gangs are shaking up their tactics in the hopes of applying increasing pressure on companies and boosting their payday....
Blog Post COVID-19 Outbreak in France Leads to Ransomware Attacks March 26, 2020 The increase of ransomware attacks in France has drawn serious government attention. Due to the global fear of the deadly...
Blog Post WordPress Plugin Vulnerability Can Wipe Any Site Clean November 30, 2021 A new WordPress plugin vulnerability was identified in Hashthemes Demo Importer. Said plugin is a popular choice among web developers....
Blog Post 10 Ransomware Strains by Advanced Cyber Gangs June 5, 2020 With the Coronavirus pandemic, healthcare organizations, their suppliers, government agencies, and educational software providers have been targeted by cyber criminal...
Blog Post Can Cars Get Hacked? July 3, 2020 The demand for connected-cars has been rising and most of the connected-cars have been sold to customers. A connected car...
Blog Post Be Aware of Bluetooth Attack May 1, 2020 Nowadays, there are various Bluetooth headsets, Bluetooth bracelets, car Bluetooth and so on. Since the advent of Bluetooth technology, it...
Blog Post Understanding Authentication April 29, 2020 Authentication is the process of recognizing a user’s identity. It is the mechanism of associating an incoming request with a...