Saudi Aramco Acknowledged Data Leak to Attack on SupplierIn late July 2021, Saudi Aramco acknowledged a data leak of its company from one of its contractors. The oil... BLOG Key Takeaways from The Recent McDonald’s Data Breach August 12, 2021 McDonald’s, one of the world’s largest food franchises, has been added to the list of high-profile companies that have experienced... FBI Warns of Conti Ransomware Attacks on U.S. Healthcare Networks June 29, 2021 At least 16 Conti ransomware attacks on U.S. healthcare and first responder networks have been identified by the Federal Bureau... What Is MTTD And MTTR And How To Improve It? December 2, 2020 The global cyber threat landscape facing businesses is becoming more daunting every year. SecOps professionals are increasingly turning to information-based... What to Include in the Incident Response Form? October 8, 2020 The definition of a “security incident” can include any incident that violates an organization’s security policies or harms its security... DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying...
Saudi Aramco Acknowledged Data Leak to Attack on SupplierIn late July 2021, Saudi Aramco acknowledged a data leak of its company from one of its contractors. The oil...
BLOG Key Takeaways from The Recent McDonald’s Data Breach August 12, 2021 McDonald’s, one of the world’s largest food franchises, has been added to the list of high-profile companies that have experienced... FBI Warns of Conti Ransomware Attacks on U.S. Healthcare Networks June 29, 2021 At least 16 Conti ransomware attacks on U.S. healthcare and first responder networks have been identified by the Federal Bureau... What Is MTTD And MTTR And How To Improve It? December 2, 2020 The global cyber threat landscape facing businesses is becoming more daunting every year. SecOps professionals are increasingly turning to information-based... What to Include in the Incident Response Form? October 8, 2020 The definition of a “security incident” can include any incident that violates an organization’s security policies or harms its security... DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying...
Key Takeaways from The Recent McDonald’s Data Breach August 12, 2021 McDonald’s, one of the world’s largest food franchises, has been added to the list of high-profile companies that have experienced...
FBI Warns of Conti Ransomware Attacks on U.S. Healthcare Networks June 29, 2021 At least 16 Conti ransomware attacks on U.S. healthcare and first responder networks have been identified by the Federal Bureau...
What Is MTTD And MTTR And How To Improve It? December 2, 2020 The global cyber threat landscape facing businesses is becoming more daunting every year. SecOps professionals are increasingly turning to information-based...
What to Include in the Incident Response Form? October 8, 2020 The definition of a “security incident” can include any incident that violates an organization’s security policies or harms its security...
DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying...