Search Results for: EDR Blog Post Let’s Understand the Endpoint Security and the Significance of Endpoint Detection and Response (EDR) Software February 9, 2021 The trend is on the rise to make access to data more fluid. Employees comfortably connect their devices to the... Blog Post Defense In Depth (DiD): What Is It And Why Is It Important? February 15, 2021 Defense in depth, or DiD, is an information security approach where organizations implement multiple layers of security controls. There will... Blog Post EKANS Ransomware Is Now Targeting Industrial Control Systems July 24, 2020 Cyber Attackers are using a variety of methods including EKANS ransomware to target industrial control systems (ICS). The ransomware can... Blog Post The Current State of Zero-Day Exploit Market January 20, 2021 Zero-day or 0day vulnerability is a security weakness that is unknown and that has not been patched by the vendor.... Blog Post The UEFI/BIOS Firmware is Vulnerable to the New TrickBot Version December 17, 2020 Recently, two security firms named Advanced Intelligence and Eclypsium dropped a bombshell in a joint report. They found that the... Blog Post “Security Controls Should Harmonize Like Orchestra” – Interview With Ondrej Krehel, LIFARS’ CEO And Founder: Part 1 October 15, 2020 Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise and Ethical Hacking. He actively... Blog Post Does Your Company Have a Data Breach Plan? December 13, 2019 The average cost to deal with cybercrime for an organization was $13 million in the United States this year,... Knowledge Center Ransomware Response Guideline, Digital Forensics and Incident Response Unit September 5, 2019 Like the name implies, ransomware is essentially digital extortion that is executed through software that uses encryption techniques to keep... Blog Post Gartner Research: Endpoint Detection and Response (EDR) Solutions are Emerging February 15, 2018 In a new report on endpoint security, prominent IT research and advisory firm Gartner has revealed valuable insights into future... Blog Post From Dridex to BitPaymer Ransomware to DoppelPaymer……The Evolution November 21, 2019 Evil Corp, also known as INDRIK SPIDER and TA505, released BitPaymer ransomware in 2017, after hitting some obstacles with Dridex....
Blog Post Let’s Understand the Endpoint Security and the Significance of Endpoint Detection and Response (EDR) Software February 9, 2021 The trend is on the rise to make access to data more fluid. Employees comfortably connect their devices to the...
Blog Post Defense In Depth (DiD): What Is It And Why Is It Important? February 15, 2021 Defense in depth, or DiD, is an information security approach where organizations implement multiple layers of security controls. There will...
Blog Post EKANS Ransomware Is Now Targeting Industrial Control Systems July 24, 2020 Cyber Attackers are using a variety of methods including EKANS ransomware to target industrial control systems (ICS). The ransomware can...
Blog Post The Current State of Zero-Day Exploit Market January 20, 2021 Zero-day or 0day vulnerability is a security weakness that is unknown and that has not been patched by the vendor....
Blog Post The UEFI/BIOS Firmware is Vulnerable to the New TrickBot Version December 17, 2020 Recently, two security firms named Advanced Intelligence and Eclypsium dropped a bombshell in a joint report. They found that the...
Blog Post “Security Controls Should Harmonize Like Orchestra” – Interview With Ondrej Krehel, LIFARS’ CEO And Founder: Part 1 October 15, 2020 Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise and Ethical Hacking. He actively...
Blog Post Does Your Company Have a Data Breach Plan? December 13, 2019 The average cost to deal with cybercrime for an organization was $13 million in the United States this year,...
Knowledge Center Ransomware Response Guideline, Digital Forensics and Incident Response Unit September 5, 2019 Like the name implies, ransomware is essentially digital extortion that is executed through software that uses encryption techniques to keep...
Blog Post Gartner Research: Endpoint Detection and Response (EDR) Solutions are Emerging February 15, 2018 In a new report on endpoint security, prominent IT research and advisory firm Gartner has revealed valuable insights into future...
Blog Post From Dridex to BitPaymer Ransomware to DoppelPaymer……The Evolution November 21, 2019 Evil Corp, also known as INDRIK SPIDER and TA505, released BitPaymer ransomware in 2017, after hitting some obstacles with Dridex....