Search Results for: encryption Blog Post The Importance of Email Encryption In Protecting Confidential Company Data December 17, 2021 In the past year, hundreds of individuals made the switch to working from home. The quantity of private information exchanged... Blog Post Benefits of end-to-end encryption & client-side encryption August 31, 2020 End-to-end and client-side encryption are controversial topics for legitimate reasons. While it makes digital forensics more difficult, it also brings many... Blog Post New but Odd BlackByte Ransomware Reusing Crypto Keys and Worms into Networks November 16, 2021 A cybersecurity firm named Trustwave has recently found a new but odd form of ransomware during its recent incident response... Blog Post Swiss Army Bans WhatsApp Amid Security Concerns February 3, 2022 The Swiss army has banned its personnel from using WhatsApp, Telegram, and Signal. The ban also extended to other foreign... Blog Post Ransomware Gangs Have a New Trick Up their Sleeves: Double-Encrypting Your Data June 16, 2021 Ransomware that double-encrypts your data is an emerging trend among ransomware gangs looking to score big. As we learn everywhere,... Blog Post Ransomware Gangs Recruiting Affiliates Now by Creating Websites July 7, 2021 Ransomware gangs have begun to promote their services by other methods after two notable Russian-speaking forums prohibited ransomware-related topics. One... Blog Post New Spyware Law in Germany Poses Threat for Press Freedom December 8, 2021 This June, German lawmakers approved legislation that would hand security forces the power to use spyware. The security agencies in... Blog Post How does Data Encryption Work? March 24, 2020 Most of us know that when we say “data encryption,” it’s a data security measure used to protect sensitive information,... Blog Post Encrypting your files is not enough for ransomware operators anymore July 9, 2020 Ransomware attacks have become a trend in the malware world, and they are a goldmine for their operators. The usual... Knowledge Center A Deep Dive into The Grief Ransomware’s Capabilities January 11, 2022 Grief ransomware is the successor of the DoppelPaymer ransomware, which emerged from the BitPaymer ransomware. Grief is deployed in an... Blog Post Mamba Ransomware Weakness Explored by the FBI April 21, 2021 The first record of a major attack where Mamba ransomware was used is from the end of 2016. According to... Knowledge Center A Detailed Analysis of the LockBit Ransomware February 24, 2022 LockBit 2.0 ransomware is one of the most active families in the wild and pretends to implement the fastest encryption... Blog Post Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username... Blog Post TrickBot Is Now Tidying Up Its Banking Trojan Module July 27, 2021 Alongside delivering ransomware, TrickBot reignites the bank fraud game. Usually, TrickBot alludes to a botnet and banking trojan to steal... Blog Post Emerging Litigation Podcast August 19, 2021 This podcast is the audio companion to the Journal on Emerging Issues in Litigation, a collaborative project between HB Litigation...
Blog Post The Importance of Email Encryption In Protecting Confidential Company Data December 17, 2021 In the past year, hundreds of individuals made the switch to working from home. The quantity of private information exchanged...
Blog Post Benefits of end-to-end encryption & client-side encryption August 31, 2020 End-to-end and client-side encryption are controversial topics for legitimate reasons. While it makes digital forensics more difficult, it also brings many...
Blog Post New but Odd BlackByte Ransomware Reusing Crypto Keys and Worms into Networks November 16, 2021 A cybersecurity firm named Trustwave has recently found a new but odd form of ransomware during its recent incident response...
Blog Post Swiss Army Bans WhatsApp Amid Security Concerns February 3, 2022 The Swiss army has banned its personnel from using WhatsApp, Telegram, and Signal. The ban also extended to other foreign...
Blog Post Ransomware Gangs Have a New Trick Up their Sleeves: Double-Encrypting Your Data June 16, 2021 Ransomware that double-encrypts your data is an emerging trend among ransomware gangs looking to score big. As we learn everywhere,...
Blog Post Ransomware Gangs Recruiting Affiliates Now by Creating Websites July 7, 2021 Ransomware gangs have begun to promote their services by other methods after two notable Russian-speaking forums prohibited ransomware-related topics. One...
Blog Post New Spyware Law in Germany Poses Threat for Press Freedom December 8, 2021 This June, German lawmakers approved legislation that would hand security forces the power to use spyware. The security agencies in...
Blog Post How does Data Encryption Work? March 24, 2020 Most of us know that when we say “data encryption,” it’s a data security measure used to protect sensitive information,...
Blog Post Encrypting your files is not enough for ransomware operators anymore July 9, 2020 Ransomware attacks have become a trend in the malware world, and they are a goldmine for their operators. The usual...
Knowledge Center A Deep Dive into The Grief Ransomware’s Capabilities January 11, 2022 Grief ransomware is the successor of the DoppelPaymer ransomware, which emerged from the BitPaymer ransomware. Grief is deployed in an...
Blog Post Mamba Ransomware Weakness Explored by the FBI April 21, 2021 The first record of a major attack where Mamba ransomware was used is from the end of 2016. According to...
Knowledge Center A Detailed Analysis of the LockBit Ransomware February 24, 2022 LockBit 2.0 ransomware is one of the most active families in the wild and pretends to implement the fastest encryption...
Blog Post Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username...
Blog Post TrickBot Is Now Tidying Up Its Banking Trojan Module July 27, 2021 Alongside delivering ransomware, TrickBot reignites the bank fraud game. Usually, TrickBot alludes to a botnet and banking trojan to steal...
Blog Post Emerging Litigation Podcast August 19, 2021 This podcast is the audio companion to the Journal on Emerging Issues in Litigation, a collaborative project between HB Litigation...