Search Results for: malware scanning Blog Post Newly Found Malware Threatens IoT Devices January 12, 2022 A new malware has been identified by AT&T Alien Labs that exposed millions of Internet of Things devices. The BotenaGo... Blog Post USB Sticks Can Cause Cyber Security Breaches December 28, 2019 Were you ever bringing in a USB Drive from home and then plugging it back into your work computer? This... Blog Post A Data Breach Can Be Caused by Misuse of VirusTotal October 29, 2019 Recently, Israeli cybersecurity company Otorio Ltd claimed that companies are leaking data such as factory blueprints to intellectual property as... Blog Post Purple Fox Malware Now Evolves to Spread Itself Across Windows Machines April 9, 2021 Purple Fox has incorporated a new technique into its arsenal, allowing it to spread itself across windows machines. Essentially, Purple... Blog Post Over 1.6 million Devices Infected by Pink Botnet January 5, 2022 With the rise of remote and hybrid working, companies are finding it harder to secure the weak points in their... Blog Post REvil Ransomware Kaseya Supply-Chain Attack Summary July 12, 2021 REvil Ransomware Kaseya: Ransomware attacks on Colonial Pipeline, JBS Foods, Kaseya and other major organizations are in the headlines, and... Blog Post The Lorenz Ransomware Gang Demand High Ransoms June 25, 2021 The Lorenz Gang Over the past few months, the Lorenz ransomware threat (the encryptor is believed to be the same... Blog Post Are open ports a security risk? October 14, 2020 Ports are numbers that are used in TCP and UDP protocols for identification of applications. While some applications use well-known... Blog Post What Is Cyber Kill Chain Process? October 23, 2020 Cyber Kill Chain is a concept branded by Lockheed Martin, that describes how the attacker proceeds with his steps during... Blog Post Introducing The New Logchecker Tool Developed By LIFARS January 12, 2021 Threat intelligence is one of the most critical weapons we can use in cyber defense. We constantly collect data about... Blog Post The Overlooked Cyber Risk of Employees Returning to the Offices from Quarantine August 24, 2020 The COVID-19 pandemic has created many challenges for businesses. Employees have been tasked with working remotely from home, in addition... Blog Post MFA Best Practices for People and Business to Interact Securely Online May 20, 2021 According to a Gartner report, end-user spending on public cloud services topped $257.5 billion in 2020. This figure is forecast... Blog Post Can Mobile Devices get Malware? May 28, 2020 Mobile malware is malicious software which targets mobile devices, such as smartphones and tablets, with an aim of accessing private... Blog Post Threat Hunting vs Digital Forensics – What Are They? Do You Need Both? May 24, 2021 Threat hunting and digital forensics are just two of the cogs in a robust and multifaceted security machine. However, there... Blog Post Iranian Script Kiddies Spread Dharma Ransomware via RDP Ports September 28, 2020 A group of script kiddies tied to Iran have been linked to the recent Dharma campaign. These “newbie” hackers are...
Blog Post Newly Found Malware Threatens IoT Devices January 12, 2022 A new malware has been identified by AT&T Alien Labs that exposed millions of Internet of Things devices. The BotenaGo...
Blog Post USB Sticks Can Cause Cyber Security Breaches December 28, 2019 Were you ever bringing in a USB Drive from home and then plugging it back into your work computer? This...
Blog Post A Data Breach Can Be Caused by Misuse of VirusTotal October 29, 2019 Recently, Israeli cybersecurity company Otorio Ltd claimed that companies are leaking data such as factory blueprints to intellectual property as...
Blog Post Purple Fox Malware Now Evolves to Spread Itself Across Windows Machines April 9, 2021 Purple Fox has incorporated a new technique into its arsenal, allowing it to spread itself across windows machines. Essentially, Purple...
Blog Post Over 1.6 million Devices Infected by Pink Botnet January 5, 2022 With the rise of remote and hybrid working, companies are finding it harder to secure the weak points in their...
Blog Post REvil Ransomware Kaseya Supply-Chain Attack Summary July 12, 2021 REvil Ransomware Kaseya: Ransomware attacks on Colonial Pipeline, JBS Foods, Kaseya and other major organizations are in the headlines, and...
Blog Post The Lorenz Ransomware Gang Demand High Ransoms June 25, 2021 The Lorenz Gang Over the past few months, the Lorenz ransomware threat (the encryptor is believed to be the same...
Blog Post Are open ports a security risk? October 14, 2020 Ports are numbers that are used in TCP and UDP protocols for identification of applications. While some applications use well-known...
Blog Post What Is Cyber Kill Chain Process? October 23, 2020 Cyber Kill Chain is a concept branded by Lockheed Martin, that describes how the attacker proceeds with his steps during...
Blog Post Introducing The New Logchecker Tool Developed By LIFARS January 12, 2021 Threat intelligence is one of the most critical weapons we can use in cyber defense. We constantly collect data about...
Blog Post The Overlooked Cyber Risk of Employees Returning to the Offices from Quarantine August 24, 2020 The COVID-19 pandemic has created many challenges for businesses. Employees have been tasked with working remotely from home, in addition...
Blog Post MFA Best Practices for People and Business to Interact Securely Online May 20, 2021 According to a Gartner report, end-user spending on public cloud services topped $257.5 billion in 2020. This figure is forecast...
Blog Post Can Mobile Devices get Malware? May 28, 2020 Mobile malware is malicious software which targets mobile devices, such as smartphones and tablets, with an aim of accessing private...
Blog Post Threat Hunting vs Digital Forensics – What Are They? Do You Need Both? May 24, 2021 Threat hunting and digital forensics are just two of the cogs in a robust and multifaceted security machine. However, there...
Blog Post Iranian Script Kiddies Spread Dharma Ransomware via RDP Ports September 28, 2020 A group of script kiddies tied to Iran have been linked to the recent Dharma campaign. These “newbie” hackers are...