Search Results for: marketing Blog Post LIFARS Appoints Gaspare J. Marturano as Chief Marketing Officer January 5, 2021 NEW YORK, NY – January 5, 2021 – LIFARS, a leading cybersecurity firm with specialized services in digital forensics, incident... Blog Post Hackbits Podcast Episode 3 – Cryptocurrency Cyber Crime: Bitcoin Hacking August 6, 2021 Ask the popularity of digital currency grows so does it’s use by threat actors around the globe. Are cryptography secure... Blog Post France Fines Google, Facebook €210 Million Over Privacy Violating Tracking Cookies January 31, 2022 The general public and government authorities are becoming increasingly conscientious about protecting data privacy online. In recent years, we’ve seen... Blog Post Verizon’s Visible Wireless Carrier Confirms Credential-Stuffing Attack November 23, 2021 In an official Reddit announcement made on October 13th, Visible confirmed that some of its user accounts were high-jacked. The... Blog Post Researchers Aim to Trace PII Data Sharing Through 300 Fake Accounts October 6, 2021 Due to a number of high-profile incidents, the way in which big companies and data brokers use (or, abuse) or... Blog Post LIFARS’ GARGAMEL Selected as SC Media 2021 Trust Award Finalist April 26, 2021 New York, NY – April 23, 2021 – LIFARS LLC, a leader in cybersecurity services, including incident response, digital forensics,... Blog Post The Dangers of BulletProofLink as a Large-Scale Phishing-As-A-Service Scheme October 27, 2021 Phishing is among the most frequent malicious activities deployed by cybercriminals and it is also one of the most effective.... Blog Post Communication During Incident Response September 25, 2020 When a cybersecurity incident occurs, it poses a direct threat to your organization’s business continuity. In a crisis, you cannot... Blog Post What Are The Most Common Myths About ISO 27001? November 27, 2020 ISO 27001:2013 is a class apart when it comes to well-known regulations or standards related to information security. Companies are... Blog Post What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT... Blog Post Quick Tips For Protecting Your Privacy Online January 2, 2020 Privacy is now in danger of no longer being considered an intrinsic right as long as surveillance becomes common in... Blog Post Cybersecurity Awareness for Executives September 14, 2020 In an organizational setup, executives sit at the top of the access level hierarchy. Most likely, your company’s executives will... Blog Post Access Rights Review September 4, 2020 Access rights are the permissions granted to a user or application for accessing a file, modifying configurations/settings, or adding or... Blog Post Ransomware as a service (RaaS): What is it and How Does It Work? May 23, 2020 Ransomware, dating back to 1989, is a variety of malware that attempts to extort money from a computer user by... Blog Post What is CSIRT/CERT Team? August 14, 2020 Irrespective of whether or not you are familiar with incident response, you would have seen that CSIRT and CERT...
Blog Post LIFARS Appoints Gaspare J. Marturano as Chief Marketing Officer January 5, 2021 NEW YORK, NY – January 5, 2021 – LIFARS, a leading cybersecurity firm with specialized services in digital forensics, incident...
Blog Post Hackbits Podcast Episode 3 – Cryptocurrency Cyber Crime: Bitcoin Hacking August 6, 2021 Ask the popularity of digital currency grows so does it’s use by threat actors around the globe. Are cryptography secure...
Blog Post France Fines Google, Facebook €210 Million Over Privacy Violating Tracking Cookies January 31, 2022 The general public and government authorities are becoming increasingly conscientious about protecting data privacy online. In recent years, we’ve seen...
Blog Post Verizon’s Visible Wireless Carrier Confirms Credential-Stuffing Attack November 23, 2021 In an official Reddit announcement made on October 13th, Visible confirmed that some of its user accounts were high-jacked. The...
Blog Post Researchers Aim to Trace PII Data Sharing Through 300 Fake Accounts October 6, 2021 Due to a number of high-profile incidents, the way in which big companies and data brokers use (or, abuse) or...
Blog Post LIFARS’ GARGAMEL Selected as SC Media 2021 Trust Award Finalist April 26, 2021 New York, NY – April 23, 2021 – LIFARS LLC, a leader in cybersecurity services, including incident response, digital forensics,...
Blog Post The Dangers of BulletProofLink as a Large-Scale Phishing-As-A-Service Scheme October 27, 2021 Phishing is among the most frequent malicious activities deployed by cybercriminals and it is also one of the most effective....
Blog Post Communication During Incident Response September 25, 2020 When a cybersecurity incident occurs, it poses a direct threat to your organization’s business continuity. In a crisis, you cannot...
Blog Post What Are The Most Common Myths About ISO 27001? November 27, 2020 ISO 27001:2013 is a class apart when it comes to well-known regulations or standards related to information security. Companies are...
Blog Post What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT...
Blog Post Quick Tips For Protecting Your Privacy Online January 2, 2020 Privacy is now in danger of no longer being considered an intrinsic right as long as surveillance becomes common in...
Blog Post Cybersecurity Awareness for Executives September 14, 2020 In an organizational setup, executives sit at the top of the access level hierarchy. Most likely, your company’s executives will...
Blog Post Access Rights Review September 4, 2020 Access rights are the permissions granted to a user or application for accessing a file, modifying configurations/settings, or adding or...
Blog Post Ransomware as a service (RaaS): What is it and How Does It Work? May 23, 2020 Ransomware, dating back to 1989, is a variety of malware that attempts to extort money from a computer user by...
Blog Post What is CSIRT/CERT Team? August 14, 2020 Irrespective of whether or not you are familiar with incident response, you would have seen that CSIRT and CERT...