Search Results for: transfer data Blog Post Zero-days in Accellion file transfer app used for data theft March 4, 2021 Back in December 2020, a software vendor Accellion informed about an actively exploited zero-day vulnerability in its File Transfer Appliance... Blog Post Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps... Blog Post Three Lessons the Accellion FTA Hack of Shell Reminded Us April 6, 2021 At the beginning of March, we informed about four actively exploited zero-day vulnerabilities in the Accellion file transfer appliance (FTA).... Blog Post Attacks on Internet of Things. How to Reduce Cost and Improve Safety of IoT? June 3, 2020 In the world of technology, the term ‘Internet of Things‘, can be any natural or man-made object that has an... Blog Post Do You Have a Data Loss Prevention (DLP)? May 29, 2020 In a normal course, business might send many kinds of data across the network. These might include sensitive information like... Blog Post Common Techniques by Which Malware Makes Itself Persistent January 19, 2021 A hacker wants to keep its malware to stay on the target device, even when the operating system restarts. Do you know... Blog Post Indian Data Protection Act: An Upsurge or Downsurge to the Data security February 18, 2020 Past years have brought a fear of a security breach in the industrial sector as well as individuals. This has... Blog Post How Internet of Things (IoT) works? July 1, 2020 What is IOT? The ability to access devices through a smartphone or through a computer is called IoT. It started... Blog Post Blockchain Technology: What You Need to Know April 29, 2020 The blockchain originated from Bitcoin. As the underlying technology of Bitcoin, it is essentially a decentralized database. It refers to... Blog Post Protect Yourself While Sharing & Downloading Files April 13, 2020 Sharing and downloading files, such as documents, programs, pictures, music, and movies is one of the most appreciated aspects of... Blog Post The Alarming Growth of Cybersecurity Threats That Leave All Sectors Vulnerable December 16, 2021 The rise of the internet has encouraged companies’ rapid adoption of technology. That results in the simplification of online transactions.... Blog Post Exchange/Outlook Autodiscover Bug Spills 100K+ Email Passwords October 20, 2021 A study conducted by Guardicore security researcher Amit Serper recently demonstrated the potential for large-scale credentials compromise owing to a... Blog Post Business Email Compromise (BEC) June 19, 2020 Business Email Compromise (BEC) is also known as Email Account Compromise (EAC) which has caused financial losses in the billions... Blog Post Cryptocurrency Mixers and Their Use In Ransomware August 15, 2020 Are cryptocurrencies anonymous? Cryptocurrencies should be both transparent and anonymous. Transparency means that everyone can check all the incoming and... Blog Post FFIEC Risk Profile March 6, 2017 The growing threat to cybersecurity has prompted the Federal Financial Institutions Examination Council (FFIEC) to develop a Cybersecurity Assessment Tool...
Blog Post Zero-days in Accellion file transfer app used for data theft March 4, 2021 Back in December 2020, a software vendor Accellion informed about an actively exploited zero-day vulnerability in its File Transfer Appliance...
Blog Post Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps...
Blog Post Three Lessons the Accellion FTA Hack of Shell Reminded Us April 6, 2021 At the beginning of March, we informed about four actively exploited zero-day vulnerabilities in the Accellion file transfer appliance (FTA)....
Blog Post Attacks on Internet of Things. How to Reduce Cost and Improve Safety of IoT? June 3, 2020 In the world of technology, the term ‘Internet of Things‘, can be any natural or man-made object that has an...
Blog Post Do You Have a Data Loss Prevention (DLP)? May 29, 2020 In a normal course, business might send many kinds of data across the network. These might include sensitive information like...
Blog Post Common Techniques by Which Malware Makes Itself Persistent January 19, 2021 A hacker wants to keep its malware to stay on the target device, even when the operating system restarts. Do you know...
Blog Post Indian Data Protection Act: An Upsurge or Downsurge to the Data security February 18, 2020 Past years have brought a fear of a security breach in the industrial sector as well as individuals. This has...
Blog Post How Internet of Things (IoT) works? July 1, 2020 What is IOT? The ability to access devices through a smartphone or through a computer is called IoT. It started...
Blog Post Blockchain Technology: What You Need to Know April 29, 2020 The blockchain originated from Bitcoin. As the underlying technology of Bitcoin, it is essentially a decentralized database. It refers to...
Blog Post Protect Yourself While Sharing & Downloading Files April 13, 2020 Sharing and downloading files, such as documents, programs, pictures, music, and movies is one of the most appreciated aspects of...
Blog Post The Alarming Growth of Cybersecurity Threats That Leave All Sectors Vulnerable December 16, 2021 The rise of the internet has encouraged companies’ rapid adoption of technology. That results in the simplification of online transactions....
Blog Post Exchange/Outlook Autodiscover Bug Spills 100K+ Email Passwords October 20, 2021 A study conducted by Guardicore security researcher Amit Serper recently demonstrated the potential for large-scale credentials compromise owing to a...
Blog Post Business Email Compromise (BEC) June 19, 2020 Business Email Compromise (BEC) is also known as Email Account Compromise (EAC) which has caused financial losses in the billions...
Blog Post Cryptocurrency Mixers and Their Use In Ransomware August 15, 2020 Are cryptocurrencies anonymous? Cryptocurrencies should be both transparent and anonymous. Transparency means that everyone can check all the incoming and...
Blog Post FFIEC Risk Profile March 6, 2017 The growing threat to cybersecurity has prompted the Federal Financial Institutions Examination Council (FFIEC) to develop a Cybersecurity Assessment Tool...