Search Results for: protect and mitigate Blog Post What is Malvertising and How to Protect and Mitigate from it? July 7, 2020 In this cyber threats awareness post we will cover following topics: Malvertising vs Ad Malware How Malware inserted into ads?... Blog Post Verizon’s Visible Wireless Carrier Confirms Credential-Stuffing Attack November 23, 2021 In an official Reddit announcement made on October 13th, Visible confirmed that some of its user accounts were high-jacked. The... Blog Post New project StopRansomware August 23, 2021 In response to the massively increasing number of ransomware attacks, The U.S. Department of Justice (DOJ) and the U.S. Department... Blog Post How to Protect Backups Against Ransomware March 23, 2021 It’s estimated that damages as a result of ransomware will reach $20 billion by 2021. Effective and risk-aware backup strategies,... Blog Post How To Protect Against Adversarial Machine Learning June 11, 2021 Many industries like finance, health care, and transportation now use Machine Learning (ML) in their business models. These sectors program... Blog Post Ransomware Conti Is Set To Infiltrate Backups November 9, 2021 Ransomware linked to hundreds of cases is now believed to be able to view, take information, delete, and even destroy... Blog Post The Current State of Zero-Day Exploit Market January 20, 2021 Zero-day or 0day vulnerability is a security weakness that is unknown and that has not been patched by the vendor.... Blog Post How To Lower The Risks Of Privileged Users Compromise? December 16, 2020 Whenever an attacker compromises an appliance, one of his first steps is to collect all the credentials he can find... Blog Post What To Look For When Selecting a DLP Solution For Your Business? June 1, 2021 According to IBM, the average data breach cost organization’s an average of $3.86 million per incident. However, organizations are only... Blog Post 2021 Has The Emergence Of Babuk Locker Ransomware January 11, 2021 Babuk Locker is a new form of ransomware that just emerged in 2021. This version of ransomware is like other... Blog Post How to Protect Against TrickBot? January 14, 2021 Trickbot is a malware that started life as a relatively straightforward banking trojan. However, as with most malware, it has... Blog Post How To Approach Cybersecurity in Critical Infrastructures June 9, 2021 A number of high-profile incidents show that the need for critical infrastructure security has never been greater. These essential industries... Blog Post Increasing Maturity Of Cybersecurity Awareness Programs June 25, 2021 In today’s digital environment, businesses, from small enterprises to established corporations, are constantly exposed to security risks. Most are continuing... Blog Post OVH Fire and Disaster Recovery – Lessons Learnt and What You Can Do to Avoid Data Loss April 23, 2021 The hosting community was recently rocked due to a major fire incident at one of hosting provider OVH’s Strasbourg-based data... Blog Post Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every...
Blog Post What is Malvertising and How to Protect and Mitigate from it? July 7, 2020 In this cyber threats awareness post we will cover following topics: Malvertising vs Ad Malware How Malware inserted into ads?...
Blog Post Verizon’s Visible Wireless Carrier Confirms Credential-Stuffing Attack November 23, 2021 In an official Reddit announcement made on October 13th, Visible confirmed that some of its user accounts were high-jacked. The...
Blog Post New project StopRansomware August 23, 2021 In response to the massively increasing number of ransomware attacks, The U.S. Department of Justice (DOJ) and the U.S. Department...
Blog Post How to Protect Backups Against Ransomware March 23, 2021 It’s estimated that damages as a result of ransomware will reach $20 billion by 2021. Effective and risk-aware backup strategies,...
Blog Post How To Protect Against Adversarial Machine Learning June 11, 2021 Many industries like finance, health care, and transportation now use Machine Learning (ML) in their business models. These sectors program...
Blog Post Ransomware Conti Is Set To Infiltrate Backups November 9, 2021 Ransomware linked to hundreds of cases is now believed to be able to view, take information, delete, and even destroy...
Blog Post The Current State of Zero-Day Exploit Market January 20, 2021 Zero-day or 0day vulnerability is a security weakness that is unknown and that has not been patched by the vendor....
Blog Post How To Lower The Risks Of Privileged Users Compromise? December 16, 2020 Whenever an attacker compromises an appliance, one of his first steps is to collect all the credentials he can find...
Blog Post What To Look For When Selecting a DLP Solution For Your Business? June 1, 2021 According to IBM, the average data breach cost organization’s an average of $3.86 million per incident. However, organizations are only...
Blog Post 2021 Has The Emergence Of Babuk Locker Ransomware January 11, 2021 Babuk Locker is a new form of ransomware that just emerged in 2021. This version of ransomware is like other...
Blog Post How to Protect Against TrickBot? January 14, 2021 Trickbot is a malware that started life as a relatively straightforward banking trojan. However, as with most malware, it has...
Blog Post How To Approach Cybersecurity in Critical Infrastructures June 9, 2021 A number of high-profile incidents show that the need for critical infrastructure security has never been greater. These essential industries...
Blog Post Increasing Maturity Of Cybersecurity Awareness Programs June 25, 2021 In today’s digital environment, businesses, from small enterprises to established corporations, are constantly exposed to security risks. Most are continuing...
Blog Post OVH Fire and Disaster Recovery – Lessons Learnt and What You Can Do to Avoid Data Loss April 23, 2021 The hosting community was recently rocked due to a major fire incident at one of hosting provider OVH’s Strasbourg-based data...
Blog Post Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every...