Search Results for: verification Blog Post The Types of Two-Step Verification August 21, 2020 Two-step verification is an important feature for keeping accounts safe. However, not all types of two-step verification are equally secure.... Blog Post New Code Signing Service sigstore April 13, 2021 Determining the origin and authenticity of open-source code is one of its disadvantages. This is also the reason why it... Blog Post How Fake Accounts and Sneaker-Bots Took Over the Internet September 3, 2021 If you’ve used any form of social media before, you have run into fake accounts with less-than-noble intentions. Usually, these... Blog Post Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username... Blog Post Ransomware Gangs Now Calling And Emailing Victims February 15, 2022 It seems like the days of short and clear threat messages are slowly becoming old-fashioned, as ransomware gangs are becoming... Blog Post Notorious Ransomware Gang Crushed by FBI in International Operation December 13, 2021 REvil, a notorious Eastern-European cybersecurity gang that has been blamed for major attacks on global businesses, has recently been compromised... Blog Post FBI’s investigation accidentally revealed the HelloKitty ransomware gang operates out of Ukraine January 21, 2022 In the never-ending fight against cybercrime, it’s rare for law enforcement to be the ones to strike it lucky. It’s... Blog Post North Korean Hackers Stole Millions from Cryptocurrency Startups Worldwide February 16, 2022 Startups have it hard enough, but now it looks like cybercriminals are making it even harder to not only achieve... Blog Post Husband and Wife Arrested in Ukraine for Ransomware Attacks on Foreign Companies February 8, 2022 In recent times, Eastern Europe has emerged as somewhat of a safe haven and Wild West for various cybercriminal gangs,... Blog Post French police detain suspect who laundered €19 million in ransomware payments January 20, 2022 In recent years, the public as a whole has become well-accustomed to high-profile ransomware attacks, especially since the global WannaCry... Blog Post What Is Hash Function? What Is It Used For and Why Is It Important? February 5, 2021 In the world of information technology and cybersecurity the term “hash”, or “hash function” appears abundantly. Hundreds of hashing algorithms... Knowledge Center PHISHING INFRASTRUCTURE May 12, 2021 Phishing Capabilities Demonstration The goal of this whitepaper is to summarize technical details of a phishing infrastructure we developed and... Blog Post Russian Security Takes Down REvil Ransomware Gang January 26, 2022 High-profile busts by U.S. law enforcement agencies, such as the FBI and their Eastern European counterparts, have become more common... Blog Post What to Include in the Incident Response Form? October 8, 2020 The definition of a “security incident” can include any incident that violates an organization’s security policies or harms its security... Blog Post Small Banks are a Step Behind Ransomware Groups, Seek Help from Congress December 1, 2021 Ransomware attacks on smaller, community banks in the US have ramped up in recent years, putting the financial data of...
Blog Post The Types of Two-Step Verification August 21, 2020 Two-step verification is an important feature for keeping accounts safe. However, not all types of two-step verification are equally secure....
Blog Post New Code Signing Service sigstore April 13, 2021 Determining the origin and authenticity of open-source code is one of its disadvantages. This is also the reason why it...
Blog Post How Fake Accounts and Sneaker-Bots Took Over the Internet September 3, 2021 If you’ve used any form of social media before, you have run into fake accounts with less-than-noble intentions. Usually, these...
Blog Post Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username...
Blog Post Ransomware Gangs Now Calling And Emailing Victims February 15, 2022 It seems like the days of short and clear threat messages are slowly becoming old-fashioned, as ransomware gangs are becoming...
Blog Post Notorious Ransomware Gang Crushed by FBI in International Operation December 13, 2021 REvil, a notorious Eastern-European cybersecurity gang that has been blamed for major attacks on global businesses, has recently been compromised...
Blog Post FBI’s investigation accidentally revealed the HelloKitty ransomware gang operates out of Ukraine January 21, 2022 In the never-ending fight against cybercrime, it’s rare for law enforcement to be the ones to strike it lucky. It’s...
Blog Post North Korean Hackers Stole Millions from Cryptocurrency Startups Worldwide February 16, 2022 Startups have it hard enough, but now it looks like cybercriminals are making it even harder to not only achieve...
Blog Post Husband and Wife Arrested in Ukraine for Ransomware Attacks on Foreign Companies February 8, 2022 In recent times, Eastern Europe has emerged as somewhat of a safe haven and Wild West for various cybercriminal gangs,...
Blog Post French police detain suspect who laundered €19 million in ransomware payments January 20, 2022 In recent years, the public as a whole has become well-accustomed to high-profile ransomware attacks, especially since the global WannaCry...
Blog Post What Is Hash Function? What Is It Used For and Why Is It Important? February 5, 2021 In the world of information technology and cybersecurity the term “hash”, or “hash function” appears abundantly. Hundreds of hashing algorithms...
Knowledge Center PHISHING INFRASTRUCTURE May 12, 2021 Phishing Capabilities Demonstration The goal of this whitepaper is to summarize technical details of a phishing infrastructure we developed and...
Blog Post Russian Security Takes Down REvil Ransomware Gang January 26, 2022 High-profile busts by U.S. law enforcement agencies, such as the FBI and their Eastern European counterparts, have become more common...
Blog Post What to Include in the Incident Response Form? October 8, 2020 The definition of a “security incident” can include any incident that violates an organization’s security policies or harms its security...
Blog Post Small Banks are a Step Behind Ransomware Groups, Seek Help from Congress December 1, 2021 Ransomware attacks on smaller, community banks in the US have ramped up in recent years, putting the financial data of...