Search Results for: cybersecurity incident Blog Post Key Takeaways from The Recent McDonald’s Data Breach August 12, 2021 McDonald’s, one of the world’s largest food franchises, has been added to the list of high-profile companies that have experienced... Blog Post Automation in Incident Response: Identifying and Responding to Potential Security Threats and Incidents June 21, 2021 Over the past few years, we have perceived the increasing use of different devices/tools and the exponential growth of cyberattacks.... Blog Post Collecting and Analyzing NetFlow for Incident Response May 7, 2021 As with any type of cybersecurity incident, you can only respond against a threat if you are able to detect... Blog Post Saudi Aramco Acknowledged Data Leak to Attack on Supplier August 24, 2021 In late July 2021, Saudi Aramco acknowledged a data leak of its company from one of its contractors. The oil... Blog Post Importance Of Documenting Incident Response Process June 3, 2021 A cybersecurity incident can range from the latest ransomware attack to a colleague clicking an email attachment from an unknown... Blog Post FBI Warns of Conti Ransomware Attacks on U.S. Healthcare Networks June 29, 2021 At least 16 Conti ransomware attacks on U.S. healthcare and first responder networks have been identified by the Federal Bureau... Blog Post Security Challenges Law Firms Facing in 2021 August 26, 2021 Organizations across all fields are facing increased pressure to be able to respond to an ever-increasing array of cyber threats... Blog Post What’s Your Security Maturity Level? August 4, 2021 Unfortunately, most organizations only learn the value of maturing their security and integrating it into their culture after a costly... Blog Post How Incident Response Retainer Brings Value to Businesses October 8, 2021 One consequence of a security breach is the leakage of classified information and the disruption of business activities. Significantly, a... Knowledge Center Incident Response Process November 3, 2020 Handling Cybersecurity Incidents according to NIST SP-61 According to ISO/IEC 27035:2011 on Information security incident management, an information security incident... Blog Post Incident Types and Taxonomies Used in Cybersec Community May 11, 2021 In the face of this complex and multi-faceted landscape of threat actors and IoCs, security experts can benefit greatly from... Blog Post DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying... Blog Post Chinese Hackers Compromising Critical Flaws in Microsoft Exchange Servers March 9, 2021 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a red warning for the users of the Microsoft Exchange email... Blog Post How Ready Are You for a Ransomware Attack? September 8, 2021 Ransomware seems to be an ever-present threat to our cybersecurity with new high-profile attacks occurring all too often. This leads... Blog Post The Lorenz Ransomware Gang Demand High Ransoms June 25, 2021 The Lorenz Gang Over the past few months, the Lorenz ransomware threat (the encryptor is believed to be the same...
Blog Post Key Takeaways from The Recent McDonald’s Data Breach August 12, 2021 McDonald’s, one of the world’s largest food franchises, has been added to the list of high-profile companies that have experienced...
Blog Post Automation in Incident Response: Identifying and Responding to Potential Security Threats and Incidents June 21, 2021 Over the past few years, we have perceived the increasing use of different devices/tools and the exponential growth of cyberattacks....
Blog Post Collecting and Analyzing NetFlow for Incident Response May 7, 2021 As with any type of cybersecurity incident, you can only respond against a threat if you are able to detect...
Blog Post Saudi Aramco Acknowledged Data Leak to Attack on Supplier August 24, 2021 In late July 2021, Saudi Aramco acknowledged a data leak of its company from one of its contractors. The oil...
Blog Post Importance Of Documenting Incident Response Process June 3, 2021 A cybersecurity incident can range from the latest ransomware attack to a colleague clicking an email attachment from an unknown...
Blog Post FBI Warns of Conti Ransomware Attacks on U.S. Healthcare Networks June 29, 2021 At least 16 Conti ransomware attacks on U.S. healthcare and first responder networks have been identified by the Federal Bureau...
Blog Post Security Challenges Law Firms Facing in 2021 August 26, 2021 Organizations across all fields are facing increased pressure to be able to respond to an ever-increasing array of cyber threats...
Blog Post What’s Your Security Maturity Level? August 4, 2021 Unfortunately, most organizations only learn the value of maturing their security and integrating it into their culture after a costly...
Blog Post How Incident Response Retainer Brings Value to Businesses October 8, 2021 One consequence of a security breach is the leakage of classified information and the disruption of business activities. Significantly, a...
Knowledge Center Incident Response Process November 3, 2020 Handling Cybersecurity Incidents according to NIST SP-61 According to ISO/IEC 27035:2011 on Information security incident management, an information security incident...
Blog Post Incident Types and Taxonomies Used in Cybersec Community May 11, 2021 In the face of this complex and multi-faceted landscape of threat actors and IoCs, security experts can benefit greatly from...
Blog Post DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying...
Blog Post Chinese Hackers Compromising Critical Flaws in Microsoft Exchange Servers March 9, 2021 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a red warning for the users of the Microsoft Exchange email...
Blog Post How Ready Are You for a Ransomware Attack? September 8, 2021 Ransomware seems to be an ever-present threat to our cybersecurity with new high-profile attacks occurring all too often. This leads...
Blog Post The Lorenz Ransomware Gang Demand High Ransoms June 25, 2021 The Lorenz Gang Over the past few months, the Lorenz ransomware threat (the encryptor is believed to be the same...