Search Results for: Computer Intrusion Blog Post China-Based Hacking Group Indicted for Series of Computer Intrusions June 12, 2019 Member of Sophisticated China-Based Hacking Group Indicted for Series of Computer Intrusions, Including 2015 Data Breach of Health Insurer Anthem... Knowledge Center APT41 – A spy who steals or a thief who spies April 21, 2020 APT41 – The Spy Who Encrypted Me. This case study is based on our most recent investigation into one of... Blog Post Current Tools and Techniques in Digital Forensics February 17, 2021 Digital forensics leverages specialized techniques and tools to investigate various forms of computer-related crimes. Digital crimes may include network intrusion,... Blog Post Operation reWired – Worldwide Sweep Targets Business Email Compromise September 19, 2019 Criminal Cases Show Need to Verify Before Wiring Funds The FBI and federal partners today announced scores of arrests in... Blog Post Data Breach: Attackers Breached Systems of United Nations October 4, 2021 As the shocking news recently emerged that hackers breached the computer networks of the United Nations, it sent shockwaves across... Blog Post Saudi Aramco Acknowledged Data Leak to Attack on Supplier August 24, 2021 In late July 2021, Saudi Aramco acknowledged a data leak of its company from one of its contractors. The oil... Blog Post McMenamins Suffered a Conti Ransomware Attack February 2, 2022 In mid-December 2021, pub and hotel chain McMenamins suffered a Conti ransomware attack that disrupted several of its computer systems.... Blog Post Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls... Blog Post Preventive Security Controls November 18, 2020 In IT security, there are certain controls that one has to implement to maintain a certain security level, react to... Page About Us May 29, 2018 LIFARS is an elite cybersecurity, digital forensics, and incident response firm based in New York City. At LIFARS, we believe... Blog Post VPN Bugs and RDP – Top Exploits Used by Ransomware Gangs September 17, 2020 This year, more cybercrime gangs and ransomware attacks have been witnessed on companies spanning multiple industries. Cybercriminals are always finding... Blog Post “If You Have Zero Incidents, You Probably Lack Monitoring” – Interview With Ondrej Krehel, LIFARS’ CEO And Founder: Part 3 October 30, 2020 Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise and Ethical Hacking. He actively... Blog Post Network Intrusion – Detection and Prevention May 13, 2020 Network intrusion refers to any unauthorized activity on a digital network. Network intrusions often involve stealing valuable network resources and... Blog Post What are Technology Controls? April 22, 2020 Technology controls can also be known as a procedure or policy that provides a reasonable assurance that the information technology... Blog Post Web App Attacks Grew 251% In Two Years January 14, 2022 In general, online threats are increasing in frequency and severity. Businesses, organizations, governmental bodies, and other groups are finding themselves...
Blog Post China-Based Hacking Group Indicted for Series of Computer Intrusions June 12, 2019 Member of Sophisticated China-Based Hacking Group Indicted for Series of Computer Intrusions, Including 2015 Data Breach of Health Insurer Anthem...
Knowledge Center APT41 – A spy who steals or a thief who spies April 21, 2020 APT41 – The Spy Who Encrypted Me. This case study is based on our most recent investigation into one of...
Blog Post Current Tools and Techniques in Digital Forensics February 17, 2021 Digital forensics leverages specialized techniques and tools to investigate various forms of computer-related crimes. Digital crimes may include network intrusion,...
Blog Post Operation reWired – Worldwide Sweep Targets Business Email Compromise September 19, 2019 Criminal Cases Show Need to Verify Before Wiring Funds The FBI and federal partners today announced scores of arrests in...
Blog Post Data Breach: Attackers Breached Systems of United Nations October 4, 2021 As the shocking news recently emerged that hackers breached the computer networks of the United Nations, it sent shockwaves across...
Blog Post Saudi Aramco Acknowledged Data Leak to Attack on Supplier August 24, 2021 In late July 2021, Saudi Aramco acknowledged a data leak of its company from one of its contractors. The oil...
Blog Post McMenamins Suffered a Conti Ransomware Attack February 2, 2022 In mid-December 2021, pub and hotel chain McMenamins suffered a Conti ransomware attack that disrupted several of its computer systems....
Blog Post Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls...
Blog Post Preventive Security Controls November 18, 2020 In IT security, there are certain controls that one has to implement to maintain a certain security level, react to...
Page About Us May 29, 2018 LIFARS is an elite cybersecurity, digital forensics, and incident response firm based in New York City. At LIFARS, we believe...
Blog Post VPN Bugs and RDP – Top Exploits Used by Ransomware Gangs September 17, 2020 This year, more cybercrime gangs and ransomware attacks have been witnessed on companies spanning multiple industries. Cybercriminals are always finding...
Blog Post “If You Have Zero Incidents, You Probably Lack Monitoring” – Interview With Ondrej Krehel, LIFARS’ CEO And Founder: Part 3 October 30, 2020 Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise and Ethical Hacking. He actively...
Blog Post Network Intrusion – Detection and Prevention May 13, 2020 Network intrusion refers to any unauthorized activity on a digital network. Network intrusions often involve stealing valuable network resources and...
Blog Post What are Technology Controls? April 22, 2020 Technology controls can also be known as a procedure or policy that provides a reasonable assurance that the information technology...
Blog Post Web App Attacks Grew 251% In Two Years January 14, 2022 In general, online threats are increasing in frequency and severity. Businesses, organizations, governmental bodies, and other groups are finding themselves...