Search Results for: email attachments Blog Post CISA: Defend Against COVID-19 Cyber Scams March 20, 2020 According to the post published by The Cybersecurity and Infrastructure Security Agency (CISA), people should remain vigilant for scams related... Blog Post Cyber Security Risks Related to the Novel Coronavirus – COVID 19 March 11, 2020 We in LIFARS are carefully following the latest developments in the cyber security realm. Thus, we are not surprised, that... Blog Post How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most... Blog Post Importance Of Documenting Incident Response Process June 3, 2021 A cybersecurity incident can range from the latest ransomware attack to a colleague clicking an email attachment from an unknown... Blog Post What Is Remote Access Trojan and How To Protect Against It? January 25, 2021 Our systems’ existing capabilities to enable remote access have proven to be a game-changer during the ongoing pandemic. Remote access... Blog Post Advanced Persistent Threats: Are They Dangerous? May 16, 2020 An advanced persistent threat, commonly referred to as an APT, is a type of a cyber attack where an attacker... Blog Post Bots and Cybersecurity June 11, 2020 A bot is a software program that performs an automated task. These tasks are usually repetitive and run without interaction.... Blog Post Sodinokibi Ransomware May 20, 2020 What is Sodinokibi? Sodinokibi Ransomware is also known as REvil or Sodin, discovered by S!Ri. It is a ransomware-type program... Blog Post Manipulation of the Human Factor For Defense February 26, 2020 End Users are said to be the weakest link to security, however, with the right security awareness training your employees... Blog Post Microsoft Breach Exposes Email Accounts April 18, 2019 Microsoft has confirmed a breach affecting an ‘limited’ number of people using their web email services. Affected email services include... Blog Post Top 10 Most Dangerous Cyber Viruses of All Time April 22, 2020 Top Destructive Cyber Viruses and How to Avoid Them. 1. CryptoLocker. CryptoLocker Ransomware was released in September 2013 and it... Blog Post The Importance of Email Encryption In Protecting Confidential Company Data December 17, 2021 In the past year, hundreds of individuals made the switch to working from home. The quantity of private information exchanged... Blog Post Quick Look at New TrickBot Affiliates December 14, 2021 The TrickBot gang, responsible for creating BazarLoader, the Conti ransomware, and the infamous TrickBot trojan, has become even more powerful... Blog Post The FBI’s Email System Was Hacked to Send Out Fake Cybersecurity Warnings December 2, 2021 On November 13th, hackers targeted the email servers of the FBI and sent phony cybersecurity warnings to over 100.000 recipients... Blog Post Emotet is Back on the Main Stage Thanks to Trickbot November 16, 2021 After we reported that the Emotet infrastructure was taken down by law enforcement here, security researcher Luca Ebach found that another malware botnet called Trickbot is helping Emotet to...
Blog Post CISA: Defend Against COVID-19 Cyber Scams March 20, 2020 According to the post published by The Cybersecurity and Infrastructure Security Agency (CISA), people should remain vigilant for scams related...
Blog Post Cyber Security Risks Related to the Novel Coronavirus – COVID 19 March 11, 2020 We in LIFARS are carefully following the latest developments in the cyber security realm. Thus, we are not surprised, that...
Blog Post How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most...
Blog Post Importance Of Documenting Incident Response Process June 3, 2021 A cybersecurity incident can range from the latest ransomware attack to a colleague clicking an email attachment from an unknown...
Blog Post What Is Remote Access Trojan and How To Protect Against It? January 25, 2021 Our systems’ existing capabilities to enable remote access have proven to be a game-changer during the ongoing pandemic. Remote access...
Blog Post Advanced Persistent Threats: Are They Dangerous? May 16, 2020 An advanced persistent threat, commonly referred to as an APT, is a type of a cyber attack where an attacker...
Blog Post Bots and Cybersecurity June 11, 2020 A bot is a software program that performs an automated task. These tasks are usually repetitive and run without interaction....
Blog Post Sodinokibi Ransomware May 20, 2020 What is Sodinokibi? Sodinokibi Ransomware is also known as REvil or Sodin, discovered by S!Ri. It is a ransomware-type program...
Blog Post Manipulation of the Human Factor For Defense February 26, 2020 End Users are said to be the weakest link to security, however, with the right security awareness training your employees...
Blog Post Microsoft Breach Exposes Email Accounts April 18, 2019 Microsoft has confirmed a breach affecting an ‘limited’ number of people using their web email services. Affected email services include...
Blog Post Top 10 Most Dangerous Cyber Viruses of All Time April 22, 2020 Top Destructive Cyber Viruses and How to Avoid Them. 1. CryptoLocker. CryptoLocker Ransomware was released in September 2013 and it...
Blog Post The Importance of Email Encryption In Protecting Confidential Company Data December 17, 2021 In the past year, hundreds of individuals made the switch to working from home. The quantity of private information exchanged...
Blog Post Quick Look at New TrickBot Affiliates December 14, 2021 The TrickBot gang, responsible for creating BazarLoader, the Conti ransomware, and the infamous TrickBot trojan, has become even more powerful...
Blog Post The FBI’s Email System Was Hacked to Send Out Fake Cybersecurity Warnings December 2, 2021 On November 13th, hackers targeted the email servers of the FBI and sent phony cybersecurity warnings to over 100.000 recipients...
Blog Post Emotet is Back on the Main Stage Thanks to Trickbot November 16, 2021 After we reported that the Emotet infrastructure was taken down by law enforcement here, security researcher Luca Ebach found that another malware botnet called Trickbot is helping Emotet to...