A Closer Look at the Russian Actors Targeting Organizations in UkraineIn the context of the ongoing war between Russia and Ukraine, we have reviewed the cyberattacks against the Ukrainian organizations... BLOG Russian Malware Disrupted Ukrainian Organizations Before Invasion March 2, 2022 Based on an alert posted by CISA on February 26, Russian-backed threat actors targeted a host of significant Ukrainian organizations, aiming to... Anonymous In a Hacking Rampage Against Russia March 2, 2022 Less than a week after announcing a cyber offensive against Russia, Anonymous has attacked over 300 Russian targets. So far, the targets... How to Decrypt the Files Encrypted by the Hive Ransomware February 24, 2022 South Korean researchers published an academic paper that presents a method to decrypt the files encrypted by the Hive Ransomware... SysJoker – A New Multi-Platform Backdoor Malware Targeting Microsoft, Mac, and Linux Systems January 26, 2022 A new, multi-platform backdoor malware was discovered in December 2021, targeting Windows, Linux, and Mac systems. The backdoor has been... Why Do You Need To Be Concerned About HTTP Request Smuggling? October 21, 2021 Over the last few months, HTTP request smuggling, the security exploit on the HTTP protocol, has gained extensive community attention.... FBI got to the pockets of criminal gangs by selling them messaging app July 14, 2021 ANOM secure messaging app: Approximately 9,000 officers deployed in 48 hours to over 700 locations in 16 countries across the... LIFARS Uncovers a Clubhouse Vulnerability, Responsible Disclosure Follows February 22, 2021 New York, February 22, 2021 – LIFARS LLC, a New York City-based leader in cybersecurity services, including incident response, digital... Let’s Understand the Endpoint Security and the Significance of Endpoint Detection and Response (EDR) Software February 9, 2021 The trend is on the rise to make access to data more fluid. Employees comfortably connect their devices to the... DEF CON Hacking Conference: “Hunting for Blue Mockingbird Coinminers” August 5, 2020 Hunting for Blue Mockingbird Coinminers. 100,000+ USD damage. 10,000+ USD mined. 1,000+ infected computers. 100+ malicious artifacts. 10+ malwares… Learn... A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... Gargamel is a tool for acquiring the forensic evidence July 16, 2020 Gargamel is a Windows tool for acquiring the forensic evidence from remote Windows or Linux machines using several different methods.... How does Public Wi-Fi Allow Cyber Thievery? June 26, 2020 Public Wi-Fi is everywhere – parks, coffeeshops, airports, hotels, public transit, libraries, and restaurants. We have also heard time and... Digital Security vs. Digital Privacy June 10, 2020 Due to the lack of uniformly recognized standards, many SME customers will be confused by some security professional terms. They... Cyber Security Webinar On-Demand: Workforce Diaspora – Adapting to Secure the Remote Workforce June 1, 2020 Free cyber security webinar on demand powered by LIFARS and Darktrace: “Workforce Diaspora – Adapting to Secure the Remote Workforce”... Mobile Devices Security May 22, 2020 With the existing threats to computers, mobile devices are more prone to cyber threats due to the latest technology which...
A Closer Look at the Russian Actors Targeting Organizations in UkraineIn the context of the ongoing war between Russia and Ukraine, we have reviewed the cyberattacks against the Ukrainian organizations...
BLOG Russian Malware Disrupted Ukrainian Organizations Before Invasion March 2, 2022 Based on an alert posted by CISA on February 26, Russian-backed threat actors targeted a host of significant Ukrainian organizations, aiming to... Anonymous In a Hacking Rampage Against Russia March 2, 2022 Less than a week after announcing a cyber offensive against Russia, Anonymous has attacked over 300 Russian targets. So far, the targets... How to Decrypt the Files Encrypted by the Hive Ransomware February 24, 2022 South Korean researchers published an academic paper that presents a method to decrypt the files encrypted by the Hive Ransomware... SysJoker – A New Multi-Platform Backdoor Malware Targeting Microsoft, Mac, and Linux Systems January 26, 2022 A new, multi-platform backdoor malware was discovered in December 2021, targeting Windows, Linux, and Mac systems. The backdoor has been... Why Do You Need To Be Concerned About HTTP Request Smuggling? October 21, 2021 Over the last few months, HTTP request smuggling, the security exploit on the HTTP protocol, has gained extensive community attention.... FBI got to the pockets of criminal gangs by selling them messaging app July 14, 2021 ANOM secure messaging app: Approximately 9,000 officers deployed in 48 hours to over 700 locations in 16 countries across the... LIFARS Uncovers a Clubhouse Vulnerability, Responsible Disclosure Follows February 22, 2021 New York, February 22, 2021 – LIFARS LLC, a New York City-based leader in cybersecurity services, including incident response, digital... Let’s Understand the Endpoint Security and the Significance of Endpoint Detection and Response (EDR) Software February 9, 2021 The trend is on the rise to make access to data more fluid. Employees comfortably connect their devices to the... DEF CON Hacking Conference: “Hunting for Blue Mockingbird Coinminers” August 5, 2020 Hunting for Blue Mockingbird Coinminers. 100,000+ USD damage. 10,000+ USD mined. 1,000+ infected computers. 100+ malicious artifacts. 10+ malwares… Learn... A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... Gargamel is a tool for acquiring the forensic evidence July 16, 2020 Gargamel is a Windows tool for acquiring the forensic evidence from remote Windows or Linux machines using several different methods.... How does Public Wi-Fi Allow Cyber Thievery? June 26, 2020 Public Wi-Fi is everywhere – parks, coffeeshops, airports, hotels, public transit, libraries, and restaurants. We have also heard time and... Digital Security vs. Digital Privacy June 10, 2020 Due to the lack of uniformly recognized standards, many SME customers will be confused by some security professional terms. They... Cyber Security Webinar On-Demand: Workforce Diaspora – Adapting to Secure the Remote Workforce June 1, 2020 Free cyber security webinar on demand powered by LIFARS and Darktrace: “Workforce Diaspora – Adapting to Secure the Remote Workforce”... Mobile Devices Security May 22, 2020 With the existing threats to computers, mobile devices are more prone to cyber threats due to the latest technology which...
Russian Malware Disrupted Ukrainian Organizations Before Invasion March 2, 2022 Based on an alert posted by CISA on February 26, Russian-backed threat actors targeted a host of significant Ukrainian organizations, aiming to...
Anonymous In a Hacking Rampage Against Russia March 2, 2022 Less than a week after announcing a cyber offensive against Russia, Anonymous has attacked over 300 Russian targets. So far, the targets...
How to Decrypt the Files Encrypted by the Hive Ransomware February 24, 2022 South Korean researchers published an academic paper that presents a method to decrypt the files encrypted by the Hive Ransomware...
SysJoker – A New Multi-Platform Backdoor Malware Targeting Microsoft, Mac, and Linux Systems January 26, 2022 A new, multi-platform backdoor malware was discovered in December 2021, targeting Windows, Linux, and Mac systems. The backdoor has been...
Why Do You Need To Be Concerned About HTTP Request Smuggling? October 21, 2021 Over the last few months, HTTP request smuggling, the security exploit on the HTTP protocol, has gained extensive community attention....
FBI got to the pockets of criminal gangs by selling them messaging app July 14, 2021 ANOM secure messaging app: Approximately 9,000 officers deployed in 48 hours to over 700 locations in 16 countries across the...
LIFARS Uncovers a Clubhouse Vulnerability, Responsible Disclosure Follows February 22, 2021 New York, February 22, 2021 – LIFARS LLC, a New York City-based leader in cybersecurity services, including incident response, digital...
Let’s Understand the Endpoint Security and the Significance of Endpoint Detection and Response (EDR) Software February 9, 2021 The trend is on the rise to make access to data more fluid. Employees comfortably connect their devices to the...
DEF CON Hacking Conference: “Hunting for Blue Mockingbird Coinminers” August 5, 2020 Hunting for Blue Mockingbird Coinminers. 100,000+ USD damage. 10,000+ USD mined. 1,000+ infected computers. 100+ malicious artifacts. 10+ malwares… Learn...
A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every...
Gargamel is a tool for acquiring the forensic evidence July 16, 2020 Gargamel is a Windows tool for acquiring the forensic evidence from remote Windows or Linux machines using several different methods....
How does Public Wi-Fi Allow Cyber Thievery? June 26, 2020 Public Wi-Fi is everywhere – parks, coffeeshops, airports, hotels, public transit, libraries, and restaurants. We have also heard time and...
Digital Security vs. Digital Privacy June 10, 2020 Due to the lack of uniformly recognized standards, many SME customers will be confused by some security professional terms. They...
Cyber Security Webinar On-Demand: Workforce Diaspora – Adapting to Secure the Remote Workforce June 1, 2020 Free cyber security webinar on demand powered by LIFARS and Darktrace: “Workforce Diaspora – Adapting to Secure the Remote Workforce”...
Mobile Devices Security May 22, 2020 With the existing threats to computers, mobile devices are more prone to cyber threats due to the latest technology which...