Avoiding Multi-Factor Authentication – What Can You Do Against It?Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username... BLOG Red Teaming Exercise With Ethical Hackers Of LIFARS December 21, 2020 Can your organization withstand a targeted attack? You can find out easily through Red Teaming – a simulation of a... Compensatory Security Controls: The Alternative Solution December 18, 2020 In the modern-day threat landscape, organizations cannot sit back and wait for an attack to happen. They need to implement... The UEFI/BIOS Firmware is Vulnerable to the New TrickBot Version December 17, 2020 Recently, two security firms named Advanced Intelligence and Eclypsium dropped a bombshell in a joint report. They found that the... How To Lower The Risks Of Privileged Users Compromise? December 16, 2020 Whenever an attacker compromises an appliance, one of his first steps is to collect all the credentials he can find... Guide To Check For Sunburst Vulnerability in SolarWinds And Whether It Was Exploited December 15, 2020 US CISA released an advisory on current activity in which it is explained that a threat actor is actively exploiting... NATO Live Stream – Russia’s Strategy in Cyberspace December 14, 2020 On December 2, NATO held a live stream discussing Russia’s strategy in cyberspace. Among the invited speakers were Oscar Jonsson... Ransomware Gangs Stoop To Cold-Calling Victims When They Restore From Backups Without Paying December 11, 2020 Stooping to further moral degradation, some ransomware gangs are now cold-calling victims in a bid to direct pressure on them.... Egregor Ransomware Attacks Creating Uncertainty in Cyberspace December 10, 2020 A relatively newer cyber assault called egregor ransomware attack is making its name in the cyber world fast. It’s becoming... K12 Online Schooling Giant Paid Ryuk Ransom To Prevent Data Leaks December 9, 2020 In Mid November 2020, K12, an online education giant, paid Ryuk ransom to the ransomware gang. The Ryuk gang made... Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps... FBI And Homeland Security Warning: The FBI And CISA Have Observed Targeting U.S. Think Tanks By APT December 7, 2020 In a joint cybersecurity advisory published on December 1, the FBI and CISA warned about APT targeting the U.S. think... Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls... How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous... What Is MTTD And MTTR And How To Improve It? December 2, 2020 The global cyber threat landscape facing businesses is becoming more daunting every year. SecOps professionals are increasingly turning to information-based...
Avoiding Multi-Factor Authentication – What Can You Do Against It?Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username...
BLOG Red Teaming Exercise With Ethical Hackers Of LIFARS December 21, 2020 Can your organization withstand a targeted attack? You can find out easily through Red Teaming – a simulation of a... Compensatory Security Controls: The Alternative Solution December 18, 2020 In the modern-day threat landscape, organizations cannot sit back and wait for an attack to happen. They need to implement... The UEFI/BIOS Firmware is Vulnerable to the New TrickBot Version December 17, 2020 Recently, two security firms named Advanced Intelligence and Eclypsium dropped a bombshell in a joint report. They found that the... How To Lower The Risks Of Privileged Users Compromise? December 16, 2020 Whenever an attacker compromises an appliance, one of his first steps is to collect all the credentials he can find... Guide To Check For Sunburst Vulnerability in SolarWinds And Whether It Was Exploited December 15, 2020 US CISA released an advisory on current activity in which it is explained that a threat actor is actively exploiting... NATO Live Stream – Russia’s Strategy in Cyberspace December 14, 2020 On December 2, NATO held a live stream discussing Russia’s strategy in cyberspace. Among the invited speakers were Oscar Jonsson... Ransomware Gangs Stoop To Cold-Calling Victims When They Restore From Backups Without Paying December 11, 2020 Stooping to further moral degradation, some ransomware gangs are now cold-calling victims in a bid to direct pressure on them.... Egregor Ransomware Attacks Creating Uncertainty in Cyberspace December 10, 2020 A relatively newer cyber assault called egregor ransomware attack is making its name in the cyber world fast. It’s becoming... K12 Online Schooling Giant Paid Ryuk Ransom To Prevent Data Leaks December 9, 2020 In Mid November 2020, K12, an online education giant, paid Ryuk ransom to the ransomware gang. The Ryuk gang made... Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps... FBI And Homeland Security Warning: The FBI And CISA Have Observed Targeting U.S. Think Tanks By APT December 7, 2020 In a joint cybersecurity advisory published on December 1, the FBI and CISA warned about APT targeting the U.S. think... Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls... How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous... What Is MTTD And MTTR And How To Improve It? December 2, 2020 The global cyber threat landscape facing businesses is becoming more daunting every year. SecOps professionals are increasingly turning to information-based...
Red Teaming Exercise With Ethical Hackers Of LIFARS December 21, 2020 Can your organization withstand a targeted attack? You can find out easily through Red Teaming – a simulation of a...
Compensatory Security Controls: The Alternative Solution December 18, 2020 In the modern-day threat landscape, organizations cannot sit back and wait for an attack to happen. They need to implement...
The UEFI/BIOS Firmware is Vulnerable to the New TrickBot Version December 17, 2020 Recently, two security firms named Advanced Intelligence and Eclypsium dropped a bombshell in a joint report. They found that the...
How To Lower The Risks Of Privileged Users Compromise? December 16, 2020 Whenever an attacker compromises an appliance, one of his first steps is to collect all the credentials he can find...
Guide To Check For Sunburst Vulnerability in SolarWinds And Whether It Was Exploited December 15, 2020 US CISA released an advisory on current activity in which it is explained that a threat actor is actively exploiting...
NATO Live Stream – Russia’s Strategy in Cyberspace December 14, 2020 On December 2, NATO held a live stream discussing Russia’s strategy in cyberspace. Among the invited speakers were Oscar Jonsson...
Ransomware Gangs Stoop To Cold-Calling Victims When They Restore From Backups Without Paying December 11, 2020 Stooping to further moral degradation, some ransomware gangs are now cold-calling victims in a bid to direct pressure on them....
Egregor Ransomware Attacks Creating Uncertainty in Cyberspace December 10, 2020 A relatively newer cyber assault called egregor ransomware attack is making its name in the cyber world fast. It’s becoming...
K12 Online Schooling Giant Paid Ryuk Ransom To Prevent Data Leaks December 9, 2020 In Mid November 2020, K12, an online education giant, paid Ryuk ransom to the ransomware gang. The Ryuk gang made...
Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps...
FBI And Homeland Security Warning: The FBI And CISA Have Observed Targeting U.S. Think Tanks By APT December 7, 2020 In a joint cybersecurity advisory published on December 1, the FBI and CISA warned about APT targeting the U.S. think...
Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls...
How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous...
What Is MTTD And MTTR And How To Improve It? December 2, 2020 The global cyber threat landscape facing businesses is becoming more daunting every year. SecOps professionals are increasingly turning to information-based...