What is the SIM3 Model?An organization’s incident response process must aim for continual improvement. It cannot achieve perfectness in its incident response right from... BLOG What to Include in the Incident Response Form? October 8, 2020 The definition of a “security incident” can include any incident that violates an organization’s security policies or harms its security... Ransomware Guide by US CISA and MS-ISAC October 5, 2020 On September 30, 2020, The US Cybersecurity & Infrastructure Security Agency (US CISA) and the Multi-State Information Sharing & Analysis... Ransomware leads to death in Germany September 18, 2020 On September 17, 2020, a German patient with a life-threatening condition was redirected to a more distant hospital after the... Incident Response: Jumpbag September 15, 2020 When incident happens, the time required to respond should be as low as possible. Every minute wasted can mean another... Cybersecurity Awareness for Executives September 14, 2020 In an organizational setup, executives sit at the top of the access level hierarchy. Most likely, your company’s executives will... Access Rights Review September 4, 2020 Access rights are the permissions granted to a user or application for accessing a file, modifying configurations/settings, or adding or... Twitter Breach: The Aftermath and Lessons Learned August 18, 2020 Many high-profile Twitter accounts including Bill Gates, Barack Obama, Elon Musk, Kim Kardashian were hacked this past July. This attack... A Bootloader Vulnerability Leaves Most Platforms Vulnerable August 17, 2020 Researchers at Eclypsium discovered a vulnerability in an open source bootloader called GRUB, widely used by most Linux distributions... DEF CON Hacking Conference: “Hunting for Blue Mockingbird Coinminers” August 5, 2020 Hunting for Blue Mockingbird Coinminers. 100,000+ USD damage. 10,000+ USD mined. 1,000+ infected computers. 100+ malicious artifacts. 10+ malwares… Learn... U.S. DoJ Charges Two Chinese Hackers for Stealing COVID-19 Research and Trade Secrets August 3, 2020 This past week, the U.S. Department of Justice (DoJ) revealed charges against two Chinese nationals. These charges related to their... A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... Gargamel is a tool for acquiring the forensic evidence July 16, 2020 Gargamel is a Windows tool for acquiring the forensic evidence from remote Windows or Linux machines using several different methods.... Encrypting your files is not enough for ransomware operators anymore July 9, 2020 Ransomware attacks have become a trend in the malware world, and they are a goldmine for their operators. The usual... The Importance of Threat Intelligence June 12, 2020 Threat Intelligence is data collected and analyzed by an organization in order to understand a threat actor’s motives, targets, and attack...
What is the SIM3 Model?An organization’s incident response process must aim for continual improvement. It cannot achieve perfectness in its incident response right from...
BLOG What to Include in the Incident Response Form? October 8, 2020 The definition of a “security incident” can include any incident that violates an organization’s security policies or harms its security... Ransomware Guide by US CISA and MS-ISAC October 5, 2020 On September 30, 2020, The US Cybersecurity & Infrastructure Security Agency (US CISA) and the Multi-State Information Sharing & Analysis... Ransomware leads to death in Germany September 18, 2020 On September 17, 2020, a German patient with a life-threatening condition was redirected to a more distant hospital after the... Incident Response: Jumpbag September 15, 2020 When incident happens, the time required to respond should be as low as possible. Every minute wasted can mean another... Cybersecurity Awareness for Executives September 14, 2020 In an organizational setup, executives sit at the top of the access level hierarchy. Most likely, your company’s executives will... Access Rights Review September 4, 2020 Access rights are the permissions granted to a user or application for accessing a file, modifying configurations/settings, or adding or... Twitter Breach: The Aftermath and Lessons Learned August 18, 2020 Many high-profile Twitter accounts including Bill Gates, Barack Obama, Elon Musk, Kim Kardashian were hacked this past July. This attack... A Bootloader Vulnerability Leaves Most Platforms Vulnerable August 17, 2020 Researchers at Eclypsium discovered a vulnerability in an open source bootloader called GRUB, widely used by most Linux distributions... DEF CON Hacking Conference: “Hunting for Blue Mockingbird Coinminers” August 5, 2020 Hunting for Blue Mockingbird Coinminers. 100,000+ USD damage. 10,000+ USD mined. 1,000+ infected computers. 100+ malicious artifacts. 10+ malwares… Learn... U.S. DoJ Charges Two Chinese Hackers for Stealing COVID-19 Research and Trade Secrets August 3, 2020 This past week, the U.S. Department of Justice (DoJ) revealed charges against two Chinese nationals. These charges related to their... A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... Gargamel is a tool for acquiring the forensic evidence July 16, 2020 Gargamel is a Windows tool for acquiring the forensic evidence from remote Windows or Linux machines using several different methods.... Encrypting your files is not enough for ransomware operators anymore July 9, 2020 Ransomware attacks have become a trend in the malware world, and they are a goldmine for their operators. The usual... The Importance of Threat Intelligence June 12, 2020 Threat Intelligence is data collected and analyzed by an organization in order to understand a threat actor’s motives, targets, and attack...
What to Include in the Incident Response Form? October 8, 2020 The definition of a “security incident” can include any incident that violates an organization’s security policies or harms its security...
Ransomware Guide by US CISA and MS-ISAC October 5, 2020 On September 30, 2020, The US Cybersecurity & Infrastructure Security Agency (US CISA) and the Multi-State Information Sharing & Analysis...
Ransomware leads to death in Germany September 18, 2020 On September 17, 2020, a German patient with a life-threatening condition was redirected to a more distant hospital after the...
Incident Response: Jumpbag September 15, 2020 When incident happens, the time required to respond should be as low as possible. Every minute wasted can mean another...
Cybersecurity Awareness for Executives September 14, 2020 In an organizational setup, executives sit at the top of the access level hierarchy. Most likely, your company’s executives will...
Access Rights Review September 4, 2020 Access rights are the permissions granted to a user or application for accessing a file, modifying configurations/settings, or adding or...
Twitter Breach: The Aftermath and Lessons Learned August 18, 2020 Many high-profile Twitter accounts including Bill Gates, Barack Obama, Elon Musk, Kim Kardashian were hacked this past July. This attack...
A Bootloader Vulnerability Leaves Most Platforms Vulnerable August 17, 2020 Researchers at Eclypsium discovered a vulnerability in an open source bootloader called GRUB, widely used by most Linux distributions...
DEF CON Hacking Conference: “Hunting for Blue Mockingbird Coinminers” August 5, 2020 Hunting for Blue Mockingbird Coinminers. 100,000+ USD damage. 10,000+ USD mined. 1,000+ infected computers. 100+ malicious artifacts. 10+ malwares… Learn...
U.S. DoJ Charges Two Chinese Hackers for Stealing COVID-19 Research and Trade Secrets August 3, 2020 This past week, the U.S. Department of Justice (DoJ) revealed charges against two Chinese nationals. These charges related to their...
A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every...
Gargamel is a tool for acquiring the forensic evidence July 16, 2020 Gargamel is a Windows tool for acquiring the forensic evidence from remote Windows or Linux machines using several different methods....
Encrypting your files is not enough for ransomware operators anymore July 9, 2020 Ransomware attacks have become a trend in the malware world, and they are a goldmine for their operators. The usual...
The Importance of Threat Intelligence June 12, 2020 Threat Intelligence is data collected and analyzed by an organization in order to understand a threat actor’s motives, targets, and attack...