How Ready Are You for a Ransomware Attack?Ransomware seems to be an ever-present threat to our cybersecurity with new high-profile attacks occurring all too often. This leads... BLOG Check Your Company’s Confluence Server ASAP! September 7, 2021 Initially when the Confluence Server Vulnerability was discovered, it was thought to be an internal threat only. A simple search... The Implementation of HTTP/2 May be Exposing Websites to Risk September 7, 2021 James Kettle – director of research at PortSwigger – demonstrated at BlackHat 2021 how attackers can exploit current practices surrounding... How Fake Accounts and Sneaker-Bots Took Over the Internet September 3, 2021 If you’ve used any form of social media before, you have run into fake accounts with less-than-noble intentions. Usually, these... Careless Employees: Sharing & Reusing Corporate Secrets September 2, 2021 A corporate secret is “any secret practices and processes that give a company a competitive advantage over its competitors.” To... Does Cybersecurity Workforce Gaps Distract Us from Leaks? September 1, 2021 64% of cybersecurity professionals report that their organization is facing some level of cybersecurity staff shortage. Unsurprisingly, 56% reported that... Importance Of Partnership Against Cybersecurity Threats August 31, 2021 It is the governments’ responsibility to help keep law and order. Nevertheless, the sheer complexity of cyberspace has shown that... MacOS Faces Threats From Rewritten Malware August 30, 2021 For a while, one of the most significant benefits of macOS X over Windows OS has been the scarcity of... Security Challenges Law Firms Facing in 2021 August 26, 2021 Organizations across all fields are facing increased pressure to be able to respond to an ever-increasing array of cyber threats... Top Techniques Used by Attackers to Bypass MFA August 25, 2021 Many consider MFA (multi-factor authentication) as one of the critical security defenses against malicious cyberattacks, and rightly so. Even a... Saudi Aramco Acknowledged Data Leak to Attack on Supplier August 24, 2021 In late July 2021, Saudi Aramco acknowledged a data leak of its company from one of its contractors. The oil... New project StopRansomware August 23, 2021 In response to the massively increasing number of ransomware attacks, The U.S. Department of Justice (DOJ) and the U.S. Department... The Plight of Fake Android Apps for Crypto Mining Services That Steal Money August 20, 2021 Cryptocurrency enthusiasts are being cautioned worldwide to be wary of Android apps that promise to mine Bitcoins over the cloud.... Emerging Litigation Podcast August 19, 2021 This podcast is the audio companion to the Journal on Emerging Issues in Litigation, a collaborative project between HB Litigation... LIFARS Alert Flashback and Update: North Korean Trojan KEYMARBLE August 18, 2021 This blog revisits the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) 2018 press release regarding...
How Ready Are You for a Ransomware Attack?Ransomware seems to be an ever-present threat to our cybersecurity with new high-profile attacks occurring all too often. This leads...
BLOG Check Your Company’s Confluence Server ASAP! September 7, 2021 Initially when the Confluence Server Vulnerability was discovered, it was thought to be an internal threat only. A simple search... The Implementation of HTTP/2 May be Exposing Websites to Risk September 7, 2021 James Kettle – director of research at PortSwigger – demonstrated at BlackHat 2021 how attackers can exploit current practices surrounding... How Fake Accounts and Sneaker-Bots Took Over the Internet September 3, 2021 If you’ve used any form of social media before, you have run into fake accounts with less-than-noble intentions. Usually, these... Careless Employees: Sharing & Reusing Corporate Secrets September 2, 2021 A corporate secret is “any secret practices and processes that give a company a competitive advantage over its competitors.” To... Does Cybersecurity Workforce Gaps Distract Us from Leaks? September 1, 2021 64% of cybersecurity professionals report that their organization is facing some level of cybersecurity staff shortage. Unsurprisingly, 56% reported that... Importance Of Partnership Against Cybersecurity Threats August 31, 2021 It is the governments’ responsibility to help keep law and order. Nevertheless, the sheer complexity of cyberspace has shown that... MacOS Faces Threats From Rewritten Malware August 30, 2021 For a while, one of the most significant benefits of macOS X over Windows OS has been the scarcity of... Security Challenges Law Firms Facing in 2021 August 26, 2021 Organizations across all fields are facing increased pressure to be able to respond to an ever-increasing array of cyber threats... Top Techniques Used by Attackers to Bypass MFA August 25, 2021 Many consider MFA (multi-factor authentication) as one of the critical security defenses against malicious cyberattacks, and rightly so. Even a... Saudi Aramco Acknowledged Data Leak to Attack on Supplier August 24, 2021 In late July 2021, Saudi Aramco acknowledged a data leak of its company from one of its contractors. The oil... New project StopRansomware August 23, 2021 In response to the massively increasing number of ransomware attacks, The U.S. Department of Justice (DOJ) and the U.S. Department... The Plight of Fake Android Apps for Crypto Mining Services That Steal Money August 20, 2021 Cryptocurrency enthusiasts are being cautioned worldwide to be wary of Android apps that promise to mine Bitcoins over the cloud.... Emerging Litigation Podcast August 19, 2021 This podcast is the audio companion to the Journal on Emerging Issues in Litigation, a collaborative project between HB Litigation... LIFARS Alert Flashback and Update: North Korean Trojan KEYMARBLE August 18, 2021 This blog revisits the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) 2018 press release regarding...
Check Your Company’s Confluence Server ASAP! September 7, 2021 Initially when the Confluence Server Vulnerability was discovered, it was thought to be an internal threat only. A simple search...
The Implementation of HTTP/2 May be Exposing Websites to Risk September 7, 2021 James Kettle – director of research at PortSwigger – demonstrated at BlackHat 2021 how attackers can exploit current practices surrounding...
How Fake Accounts and Sneaker-Bots Took Over the Internet September 3, 2021 If you’ve used any form of social media before, you have run into fake accounts with less-than-noble intentions. Usually, these...
Careless Employees: Sharing & Reusing Corporate Secrets September 2, 2021 A corporate secret is “any secret practices and processes that give a company a competitive advantage over its competitors.” To...
Does Cybersecurity Workforce Gaps Distract Us from Leaks? September 1, 2021 64% of cybersecurity professionals report that their organization is facing some level of cybersecurity staff shortage. Unsurprisingly, 56% reported that...
Importance Of Partnership Against Cybersecurity Threats August 31, 2021 It is the governments’ responsibility to help keep law and order. Nevertheless, the sheer complexity of cyberspace has shown that...
MacOS Faces Threats From Rewritten Malware August 30, 2021 For a while, one of the most significant benefits of macOS X over Windows OS has been the scarcity of...
Security Challenges Law Firms Facing in 2021 August 26, 2021 Organizations across all fields are facing increased pressure to be able to respond to an ever-increasing array of cyber threats...
Top Techniques Used by Attackers to Bypass MFA August 25, 2021 Many consider MFA (multi-factor authentication) as one of the critical security defenses against malicious cyberattacks, and rightly so. Even a...
Saudi Aramco Acknowledged Data Leak to Attack on Supplier August 24, 2021 In late July 2021, Saudi Aramco acknowledged a data leak of its company from one of its contractors. The oil...
New project StopRansomware August 23, 2021 In response to the massively increasing number of ransomware attacks, The U.S. Department of Justice (DOJ) and the U.S. Department...
The Plight of Fake Android Apps for Crypto Mining Services That Steal Money August 20, 2021 Cryptocurrency enthusiasts are being cautioned worldwide to be wary of Android apps that promise to mine Bitcoins over the cloud....
Emerging Litigation Podcast August 19, 2021 This podcast is the audio companion to the Journal on Emerging Issues in Litigation, a collaborative project between HB Litigation...
LIFARS Alert Flashback and Update: North Korean Trojan KEYMARBLE August 18, 2021 This blog revisits the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) 2018 press release regarding...