Internal v. External Security PersonnelOver the years, cyberattacks have grown in sophistication and diversity. The threat landscape is continuously evolving, and there does not... BLOG What is incident response readiness assessment? September 22, 2020 During an ongoing cyberattack, time is of critical essence. Your incident response team must know what it needs to do.... VPN Bugs and RDP – Top Exploits Used by Ransomware Gangs September 17, 2020 This year, more cybercrime gangs and ransomware attacks have been witnessed on companies spanning multiple industries. Cybercriminals are always finding... Incident Response: Jumpbag September 15, 2020 When incident happens, the time required to respond should be as low as possible. Every minute wasted can mean another... Cybersecurity Awareness for Executives September 14, 2020 In an organizational setup, executives sit at the top of the access level hierarchy. Most likely, your company’s executives will... Business Impact Analysis (BIA) September 11, 2020 Modern-day enterprises thrive on making data-oriented decisions to further their business objectives. Such organizations seek to implement a business continuity... Darkside: New Ransomware Operation Demanding Million Dollar Ransom September 10, 2020 Darkside, the latest ransomware operation to emerge has been attacking organizations beginning earlier this month. Darkside’s customized attacks on companies... Drovorub: The Latest Russian Cyber Weapon September 9, 2020 The NSA and the FBI released a joint statement about a previously undisclosed malware used by the Russian military intelligence unit –... Access Rights Review September 4, 2020 Access rights are the permissions granted to a user or application for accessing a file, modifying configurations/settings, or adding or... DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying... What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an... Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack... FBI Warns of Windows 7 end-of-life Security Risk August 28, 2020 Earlier this month, the FBI sent out a warning to U.S. private sector partners about the Windows 7 operating system.... Backup Policy vs Backup Plan vs Backup Procedure August 27, 2020 Modern-day enterprises implement a flurry of security measures to protect their IT infrastructure from ever-evolving threats. These security measures... €2.9 Million Issued in Fines in Q2 2020 Under GDPR August 27, 2020 The COVID-19 pandemic brought on many problems for organizations from all industries across the world. Organizations that were able to...
Internal v. External Security PersonnelOver the years, cyberattacks have grown in sophistication and diversity. The threat landscape is continuously evolving, and there does not...
BLOG What is incident response readiness assessment? September 22, 2020 During an ongoing cyberattack, time is of critical essence. Your incident response team must know what it needs to do.... VPN Bugs and RDP – Top Exploits Used by Ransomware Gangs September 17, 2020 This year, more cybercrime gangs and ransomware attacks have been witnessed on companies spanning multiple industries. Cybercriminals are always finding... Incident Response: Jumpbag September 15, 2020 When incident happens, the time required to respond should be as low as possible. Every minute wasted can mean another... Cybersecurity Awareness for Executives September 14, 2020 In an organizational setup, executives sit at the top of the access level hierarchy. Most likely, your company’s executives will... Business Impact Analysis (BIA) September 11, 2020 Modern-day enterprises thrive on making data-oriented decisions to further their business objectives. Such organizations seek to implement a business continuity... Darkside: New Ransomware Operation Demanding Million Dollar Ransom September 10, 2020 Darkside, the latest ransomware operation to emerge has been attacking organizations beginning earlier this month. Darkside’s customized attacks on companies... Drovorub: The Latest Russian Cyber Weapon September 9, 2020 The NSA and the FBI released a joint statement about a previously undisclosed malware used by the Russian military intelligence unit –... Access Rights Review September 4, 2020 Access rights are the permissions granted to a user or application for accessing a file, modifying configurations/settings, or adding or... DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying... What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an... Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack... FBI Warns of Windows 7 end-of-life Security Risk August 28, 2020 Earlier this month, the FBI sent out a warning to U.S. private sector partners about the Windows 7 operating system.... Backup Policy vs Backup Plan vs Backup Procedure August 27, 2020 Modern-day enterprises implement a flurry of security measures to protect their IT infrastructure from ever-evolving threats. These security measures... €2.9 Million Issued in Fines in Q2 2020 Under GDPR August 27, 2020 The COVID-19 pandemic brought on many problems for organizations from all industries across the world. Organizations that were able to...
What is incident response readiness assessment? September 22, 2020 During an ongoing cyberattack, time is of critical essence. Your incident response team must know what it needs to do....
VPN Bugs and RDP – Top Exploits Used by Ransomware Gangs September 17, 2020 This year, more cybercrime gangs and ransomware attacks have been witnessed on companies spanning multiple industries. Cybercriminals are always finding...
Incident Response: Jumpbag September 15, 2020 When incident happens, the time required to respond should be as low as possible. Every minute wasted can mean another...
Cybersecurity Awareness for Executives September 14, 2020 In an organizational setup, executives sit at the top of the access level hierarchy. Most likely, your company’s executives will...
Business Impact Analysis (BIA) September 11, 2020 Modern-day enterprises thrive on making data-oriented decisions to further their business objectives. Such organizations seek to implement a business continuity...
Darkside: New Ransomware Operation Demanding Million Dollar Ransom September 10, 2020 Darkside, the latest ransomware operation to emerge has been attacking organizations beginning earlier this month. Darkside’s customized attacks on companies...
Drovorub: The Latest Russian Cyber Weapon September 9, 2020 The NSA and the FBI released a joint statement about a previously undisclosed malware used by the Russian military intelligence unit –...
Access Rights Review September 4, 2020 Access rights are the permissions granted to a user or application for accessing a file, modifying configurations/settings, or adding or...
DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying...
What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an...
Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack...
FBI Warns of Windows 7 end-of-life Security Risk August 28, 2020 Earlier this month, the FBI sent out a warning to U.S. private sector partners about the Windows 7 operating system....
Backup Policy vs Backup Plan vs Backup Procedure August 27, 2020 Modern-day enterprises implement a flurry of security measures to protect their IT infrastructure from ever-evolving threats. These security measures...
€2.9 Million Issued in Fines in Q2 2020 Under GDPR August 27, 2020 The COVID-19 pandemic brought on many problems for organizations from all industries across the world. Organizations that were able to...