Search Results for: threat intelligence Knowledge Center Logchecker – New Tool for Threat Intelligence Developed by LIFARS January 12, 2021 Introducing The Logchecker Tool Logchecker is a new Windows and Linux tool for scanning log files, developed by LIFARS. It... Blog Post The Colonial Pipeline – DarkSide Ransomware Attack May 11, 2021 Last week, the United States experienced one of the most significant cyber-attacks in its history. The Department of Homeland Security... Blog Post Introducing The New Logchecker Tool Developed By LIFARS January 12, 2021 Threat intelligence is one of the most critical weapons we can use in cyber defense. We constantly collect data about... Blog Post The Importance of Threat Intelligence June 12, 2020 Threat Intelligence is data collected and analyzed by an organization in order to understand a threat actor’s motives, targets, and attack... Blog Post What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT... Blog Post Introduction To Black Teaming Exercises January 15, 2021 From startups to enterprises, organizations of all sizes require a structured approach to secure their IT infrastructure. An adequate level... Blog Post A Detailed Analysis of WhisperGate Targeting Ukrainian Organizations January 20, 2022 Microsoft reported evidence of destructive malware targeting organizations in Ukraine starting from January 13 [1]. The LIFARS threat intelligence team... Blog Post Ransomware leads to death in Germany September 18, 2020 On September 17, 2020, a German patient with a life-threatening condition was redirected to a more distant hospital after the... Blog Post Russian Malware Disrupted Ukrainian Organizations Before Invasion March 2, 2022 Based on an alert posted by CISA on February 26, Russian-backed threat actors targeted a host of significant Ukrainian organizations, aiming to... Blog Post What Is Threat Modeling in Cybersecurity? A Brief Introduction October 13, 2020 A growing number of enterprises are using threat modeling to improve their applications’ security architecture. But what is threat modeling... Page Information Security Newsletter – Data Security, Cyber Defense Strategy and Risk Vulnerability Management Tips May 22, 2020 Blog Post COVID‐19 Cyber Threat Coalition – USSS Information Alert May 2, 2020 Criminal groups are exploiting the COVID‐19 pandemic to target healthcare systems and critical IT infrastructure all over the world. The... Blog Post Ransomware Attacker Offers Employees a Cut if They Install DemonWare on Their Organization’s Systems September 30, 2021 It may seem impossible to think that your employees or peers could knowingly compromise the security of your business. However,... Blog Post Cyber Security Webinar On-Demand: Workforce Diaspora – Adapting to Secure the Remote Workforce June 1, 2020 Free cyber security webinar on demand powered by LIFARS and Darktrace: “Workforce Diaspora – Adapting to Secure the Remote Workforce”... Blog Post Lazarus Hacking Group Set IT Supply Chain Attacks in Motion November 25, 2021 North Korean-backed Lazarus hacking group that inclines to infiltrate the military has now shifted its focus on new targets. It...
Knowledge Center Logchecker – New Tool for Threat Intelligence Developed by LIFARS January 12, 2021 Introducing The Logchecker Tool Logchecker is a new Windows and Linux tool for scanning log files, developed by LIFARS. It...
Blog Post The Colonial Pipeline – DarkSide Ransomware Attack May 11, 2021 Last week, the United States experienced one of the most significant cyber-attacks in its history. The Department of Homeland Security...
Blog Post Introducing The New Logchecker Tool Developed By LIFARS January 12, 2021 Threat intelligence is one of the most critical weapons we can use in cyber defense. We constantly collect data about...
Blog Post The Importance of Threat Intelligence June 12, 2020 Threat Intelligence is data collected and analyzed by an organization in order to understand a threat actor’s motives, targets, and attack...
Blog Post What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT...
Blog Post Introduction To Black Teaming Exercises January 15, 2021 From startups to enterprises, organizations of all sizes require a structured approach to secure their IT infrastructure. An adequate level...
Blog Post A Detailed Analysis of WhisperGate Targeting Ukrainian Organizations January 20, 2022 Microsoft reported evidence of destructive malware targeting organizations in Ukraine starting from January 13 [1]. The LIFARS threat intelligence team...
Blog Post Ransomware leads to death in Germany September 18, 2020 On September 17, 2020, a German patient with a life-threatening condition was redirected to a more distant hospital after the...
Blog Post Russian Malware Disrupted Ukrainian Organizations Before Invasion March 2, 2022 Based on an alert posted by CISA on February 26, Russian-backed threat actors targeted a host of significant Ukrainian organizations, aiming to...
Blog Post What Is Threat Modeling in Cybersecurity? A Brief Introduction October 13, 2020 A growing number of enterprises are using threat modeling to improve their applications’ security architecture. But what is threat modeling...
Page Information Security Newsletter – Data Security, Cyber Defense Strategy and Risk Vulnerability Management Tips May 22, 2020
Blog Post COVID‐19 Cyber Threat Coalition – USSS Information Alert May 2, 2020 Criminal groups are exploiting the COVID‐19 pandemic to target healthcare systems and critical IT infrastructure all over the world. The...
Blog Post Ransomware Attacker Offers Employees a Cut if They Install DemonWare on Their Organization’s Systems September 30, 2021 It may seem impossible to think that your employees or peers could knowingly compromise the security of your business. However,...
Blog Post Cyber Security Webinar On-Demand: Workforce Diaspora – Adapting to Secure the Remote Workforce June 1, 2020 Free cyber security webinar on demand powered by LIFARS and Darktrace: “Workforce Diaspora – Adapting to Secure the Remote Workforce”...
Blog Post Lazarus Hacking Group Set IT Supply Chain Attacks in Motion November 25, 2021 North Korean-backed Lazarus hacking group that inclines to infiltrate the military has now shifted its focus on new targets. It...