SecurityScorecard acquires LIFARS to establish a DFIR services practiceOur world is changing rapidly. More than ever, organizations are reliant on digital technologies to do business. Cyber threats continue... BLOG Check Your Company’s Confluence Server ASAP! September 7, 2021 Initially when the Confluence Server Vulnerability was discovered, it was thought to be an internal threat only. A simple search... The Current State of Zero-Day Exploit Market January 20, 2021 Zero-day or 0day vulnerability is a security weakness that is unknown and that has not been patched by the vendor.... Banks On Alert Though Seemingly The Financial Sector Is Not A Specific Focus Of The Ongoing Hacking Campaign January 13, 2021 The ongoing hacking campaign has sent shock waves across the U.S. government and the private sector. Meanwhile, as per bank... Introducing The New Logchecker Tool Developed By LIFARS January 12, 2021 Threat intelligence is one of the most critical weapons we can use in cyber defense. We constantly collect data about... 2021 Has The Emergence Of Babuk Locker Ransomware January 11, 2021 Babuk Locker is a new form of ransomware that just emerged in 2021. This version of ransomware is like other... Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge.... LIFARS Appoints Gaspare J. Marturano as Chief Marketing Officer January 5, 2021 NEW YORK, NY – January 5, 2021 – LIFARS, a leading cybersecurity firm with specialized services in digital forensics, incident... How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most... Attacks Are Getting Pricier: Average Ransomware Payment Ramped Up By 60% January 4, 2021 Ransomware is a severe and recurring cyberattack nowadays. It happens when a cyber threat actor locks a company’s data with... Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the... E-Land Retail Ransomware Attack December 30, 2020 E-Land Retail, a subsidiary of the E-Land Group conglomerate announced on 23 November of 2020 that it suffered a massive... CISA Urged Admins To Apply The Security Update To Patch Vulnerability In OpenSSL December 29, 2020 On December 8, 2020, OpenSSL issued a security update for a high severity DoS vulnerability that affects the open-source project.... How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... Supply Chain Attacks And Third-Party Risk Management December 23, 2020 In real terms, third-party risk management is about identifying the vulnerabilities of your outside vendors and determining approaches to overcome... Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username...
SecurityScorecard acquires LIFARS to establish a DFIR services practiceOur world is changing rapidly. More than ever, organizations are reliant on digital technologies to do business. Cyber threats continue...
BLOG Check Your Company’s Confluence Server ASAP! September 7, 2021 Initially when the Confluence Server Vulnerability was discovered, it was thought to be an internal threat only. A simple search... The Current State of Zero-Day Exploit Market January 20, 2021 Zero-day or 0day vulnerability is a security weakness that is unknown and that has not been patched by the vendor.... Banks On Alert Though Seemingly The Financial Sector Is Not A Specific Focus Of The Ongoing Hacking Campaign January 13, 2021 The ongoing hacking campaign has sent shock waves across the U.S. government and the private sector. Meanwhile, as per bank... Introducing The New Logchecker Tool Developed By LIFARS January 12, 2021 Threat intelligence is one of the most critical weapons we can use in cyber defense. We constantly collect data about... 2021 Has The Emergence Of Babuk Locker Ransomware January 11, 2021 Babuk Locker is a new form of ransomware that just emerged in 2021. This version of ransomware is like other... Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge.... LIFARS Appoints Gaspare J. Marturano as Chief Marketing Officer January 5, 2021 NEW YORK, NY – January 5, 2021 – LIFARS, a leading cybersecurity firm with specialized services in digital forensics, incident... How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most... Attacks Are Getting Pricier: Average Ransomware Payment Ramped Up By 60% January 4, 2021 Ransomware is a severe and recurring cyberattack nowadays. It happens when a cyber threat actor locks a company’s data with... Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the... E-Land Retail Ransomware Attack December 30, 2020 E-Land Retail, a subsidiary of the E-Land Group conglomerate announced on 23 November of 2020 that it suffered a massive... CISA Urged Admins To Apply The Security Update To Patch Vulnerability In OpenSSL December 29, 2020 On December 8, 2020, OpenSSL issued a security update for a high severity DoS vulnerability that affects the open-source project.... How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... Supply Chain Attacks And Third-Party Risk Management December 23, 2020 In real terms, third-party risk management is about identifying the vulnerabilities of your outside vendors and determining approaches to overcome... Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username...
Check Your Company’s Confluence Server ASAP! September 7, 2021 Initially when the Confluence Server Vulnerability was discovered, it was thought to be an internal threat only. A simple search...
The Current State of Zero-Day Exploit Market January 20, 2021 Zero-day or 0day vulnerability is a security weakness that is unknown and that has not been patched by the vendor....
Banks On Alert Though Seemingly The Financial Sector Is Not A Specific Focus Of The Ongoing Hacking Campaign January 13, 2021 The ongoing hacking campaign has sent shock waves across the U.S. government and the private sector. Meanwhile, as per bank...
Introducing The New Logchecker Tool Developed By LIFARS January 12, 2021 Threat intelligence is one of the most critical weapons we can use in cyber defense. We constantly collect data about...
2021 Has The Emergence Of Babuk Locker Ransomware January 11, 2021 Babuk Locker is a new form of ransomware that just emerged in 2021. This version of ransomware is like other...
Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge....
LIFARS Appoints Gaspare J. Marturano as Chief Marketing Officer January 5, 2021 NEW YORK, NY – January 5, 2021 – LIFARS, a leading cybersecurity firm with specialized services in digital forensics, incident...
How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most...
Attacks Are Getting Pricier: Average Ransomware Payment Ramped Up By 60% January 4, 2021 Ransomware is a severe and recurring cyberattack nowadays. It happens when a cyber threat actor locks a company’s data with...
Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the...
E-Land Retail Ransomware Attack December 30, 2020 E-Land Retail, a subsidiary of the E-Land Group conglomerate announced on 23 November of 2020 that it suffered a massive...
CISA Urged Admins To Apply The Security Update To Patch Vulnerability In OpenSSL December 29, 2020 On December 8, 2020, OpenSSL issued a security update for a high severity DoS vulnerability that affects the open-source project....
How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place....
Supply Chain Attacks And Third-Party Risk Management December 23, 2020 In real terms, third-party risk management is about identifying the vulnerabilities of your outside vendors and determining approaches to overcome...
Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username...