International forums and organizations for CSIRT/CERT teamsAs threats continue to grow in our cyberspace, setting up a dedicated team for incident response has become an undeniable... BLOG Advantages of Cyber Incident Retainers August 25, 2020 Being on constant alert for cyber threats to your organization is a must. A cyber-attack can strike your organization at... Canadian Government’s GCKey Service Targeted by Cyberattacks and Used to Steal COVID-19 Relief Benefits August 25, 2020 Recently, the Canadian government services were targeted by cyberattacks used to steal COVID-19 relief payments. The attacks breached the Canadian... The Types of Two-Step Verification August 21, 2020 Two-step verification is an important feature for keeping accounts safe. However, not all types of two-step verification are equally secure.... 5 ways To Improve Security Awareness Training August 20, 2020 The weakest link of the cybersecurity chain is the user. Therefore, expensive antivirus and software may not always hold up... The Top Six Cyber Security Threats for 2020 August 19, 2020 The estimated cost of cyber crimes across the globe will reach up to $6 trillion a year by 2021, according... A Bootloader Vulnerability Leaves Most Platforms Vulnerable August 17, 2020 Researchers at Eclypsium discovered a vulnerability in an open source bootloader called GRUB, widely used by most Linux distributions... Understanding The Common Vulnerability Scoring System August 10, 2020 A vulnerability is a weakness in hardware, software, personnel, or procedures. However, not all vulnerabilities are equal. Some vulnerabilities have... Unprecedented Amounts of Usernames and Passwords for Sale July 31, 2020 There has been a large increase of consumer credentials being sold on the dark web. A 300 percent increase in... What Is Cybersecurity Exercising? July 27, 2020 Goals? Cybersecurity exercises are designated for companies‘ IT staff, security teams, incident response teams, CSIRTs, CERTs, etc. The training aims... EKANS Ransomware Is Now Targeting Industrial Control Systems July 24, 2020 Cyber Attackers are using a variety of methods including EKANS ransomware to target industrial control systems (ICS). The ransomware can... Analysis of TrickBot Malware – the most prolific COVID-19 themed malware July 23, 2020 In this article you will learn about: Distribution techniques of TrickBot malware Different modules and tasks of the TrickBot payload ... Threat, vulnerability, risk: What is the difference? July 22, 2020 Threat, vulnerability and risk are terms that are commonly mixed up. However, their understanding is crucial for building effective... Americans Unconcerned About Data Security During Covid-19 Era July 16, 2020 In this article we will cover the following topics: Citizens lack awareness of cyber security despite growing number of attacks ... The importance of Cyber Hygiene July 14, 2020 Much like practicing personal hygiene is important to maintaining good health and well-being, practicing cyber hygiene is vital to keeping...
International forums and organizations for CSIRT/CERT teamsAs threats continue to grow in our cyberspace, setting up a dedicated team for incident response has become an undeniable...
BLOG Advantages of Cyber Incident Retainers August 25, 2020 Being on constant alert for cyber threats to your organization is a must. A cyber-attack can strike your organization at... Canadian Government’s GCKey Service Targeted by Cyberattacks and Used to Steal COVID-19 Relief Benefits August 25, 2020 Recently, the Canadian government services were targeted by cyberattacks used to steal COVID-19 relief payments. The attacks breached the Canadian... The Types of Two-Step Verification August 21, 2020 Two-step verification is an important feature for keeping accounts safe. However, not all types of two-step verification are equally secure.... 5 ways To Improve Security Awareness Training August 20, 2020 The weakest link of the cybersecurity chain is the user. Therefore, expensive antivirus and software may not always hold up... The Top Six Cyber Security Threats for 2020 August 19, 2020 The estimated cost of cyber crimes across the globe will reach up to $6 trillion a year by 2021, according... A Bootloader Vulnerability Leaves Most Platforms Vulnerable August 17, 2020 Researchers at Eclypsium discovered a vulnerability in an open source bootloader called GRUB, widely used by most Linux distributions... Understanding The Common Vulnerability Scoring System August 10, 2020 A vulnerability is a weakness in hardware, software, personnel, or procedures. However, not all vulnerabilities are equal. Some vulnerabilities have... Unprecedented Amounts of Usernames and Passwords for Sale July 31, 2020 There has been a large increase of consumer credentials being sold on the dark web. A 300 percent increase in... What Is Cybersecurity Exercising? July 27, 2020 Goals? Cybersecurity exercises are designated for companies‘ IT staff, security teams, incident response teams, CSIRTs, CERTs, etc. The training aims... EKANS Ransomware Is Now Targeting Industrial Control Systems July 24, 2020 Cyber Attackers are using a variety of methods including EKANS ransomware to target industrial control systems (ICS). The ransomware can... Analysis of TrickBot Malware – the most prolific COVID-19 themed malware July 23, 2020 In this article you will learn about: Distribution techniques of TrickBot malware Different modules and tasks of the TrickBot payload ... Threat, vulnerability, risk: What is the difference? July 22, 2020 Threat, vulnerability and risk are terms that are commonly mixed up. However, their understanding is crucial for building effective... Americans Unconcerned About Data Security During Covid-19 Era July 16, 2020 In this article we will cover the following topics: Citizens lack awareness of cyber security despite growing number of attacks ... The importance of Cyber Hygiene July 14, 2020 Much like practicing personal hygiene is important to maintaining good health and well-being, practicing cyber hygiene is vital to keeping...
Advantages of Cyber Incident Retainers August 25, 2020 Being on constant alert for cyber threats to your organization is a must. A cyber-attack can strike your organization at...
Canadian Government’s GCKey Service Targeted by Cyberattacks and Used to Steal COVID-19 Relief Benefits August 25, 2020 Recently, the Canadian government services were targeted by cyberattacks used to steal COVID-19 relief payments. The attacks breached the Canadian...
The Types of Two-Step Verification August 21, 2020 Two-step verification is an important feature for keeping accounts safe. However, not all types of two-step verification are equally secure....
5 ways To Improve Security Awareness Training August 20, 2020 The weakest link of the cybersecurity chain is the user. Therefore, expensive antivirus and software may not always hold up...
The Top Six Cyber Security Threats for 2020 August 19, 2020 The estimated cost of cyber crimes across the globe will reach up to $6 trillion a year by 2021, according...
A Bootloader Vulnerability Leaves Most Platforms Vulnerable August 17, 2020 Researchers at Eclypsium discovered a vulnerability in an open source bootloader called GRUB, widely used by most Linux distributions...
Understanding The Common Vulnerability Scoring System August 10, 2020 A vulnerability is a weakness in hardware, software, personnel, or procedures. However, not all vulnerabilities are equal. Some vulnerabilities have...
Unprecedented Amounts of Usernames and Passwords for Sale July 31, 2020 There has been a large increase of consumer credentials being sold on the dark web. A 300 percent increase in...
What Is Cybersecurity Exercising? July 27, 2020 Goals? Cybersecurity exercises are designated for companies‘ IT staff, security teams, incident response teams, CSIRTs, CERTs, etc. The training aims...
EKANS Ransomware Is Now Targeting Industrial Control Systems July 24, 2020 Cyber Attackers are using a variety of methods including EKANS ransomware to target industrial control systems (ICS). The ransomware can...
Analysis of TrickBot Malware – the most prolific COVID-19 themed malware July 23, 2020 In this article you will learn about: Distribution techniques of TrickBot malware Different modules and tasks of the TrickBot payload ...
Threat, vulnerability, risk: What is the difference? July 22, 2020 Threat, vulnerability and risk are terms that are commonly mixed up. However, their understanding is crucial for building effective...
Americans Unconcerned About Data Security During Covid-19 Era July 16, 2020 In this article we will cover the following topics: Citizens lack awareness of cyber security despite growing number of attacks ...
The importance of Cyber Hygiene July 14, 2020 Much like practicing personal hygiene is important to maintaining good health and well-being, practicing cyber hygiene is vital to keeping...