“Security Controls Should Harmonize Like Orchestra” – Interview With Ondrej Krehel, LIFARS’ CEO And Founder: Part 1Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise and Ethical Hacking. He actively... BLOG Steve Durbin, Managing Director at the ISF Interview with Ondrej Krehel About Current Cyber Threats October 1, 2020 ISF Podcast: A Digital Forensics Specialist on Data Breaches It is an unavoidable fact that businesses and organizations’ sensitive information... How to Plan, Conduct, and Manage Tabletop Exercises? September 30, 2020 A successful cyberattack impacts business operations, reputation, customer trust, and profitability. In the cyberspace, threats are evolving continuously, and tactics,... Has Your Home Network Been Compromised!? September 29, 2020 Have you ever wondered if you would notice that your home network was compromised? Attackers can be stealthy, and they... Iranian Script Kiddies Spread Dharma Ransomware via RDP Ports September 28, 2020 A group of script kiddies tied to Iran have been linked to the recent Dharma campaign. These “newbie” hackers are... Communication During Incident Response September 25, 2020 When a cybersecurity incident occurs, it poses a direct threat to your organization’s business continuity. In a crisis, you cannot... VPN Bugs and RDP – Top Exploits Used by Ransomware Gangs September 17, 2020 This year, more cybercrime gangs and ransomware attacks have been witnessed on companies spanning multiple industries. Cybercriminals are always finding... Business Impact Analysis (BIA) September 11, 2020 Modern-day enterprises thrive on making data-oriented decisions to further their business objectives. Such organizations seek to implement a business continuity... Darkside: New Ransomware Operation Demanding Million Dollar Ransom September 10, 2020 Darkside, the latest ransomware operation to emerge has been attacking organizations beginning earlier this month. Darkside’s customized attacks on companies... Drovorub: The Latest Russian Cyber Weapon September 9, 2020 The NSA and the FBI released a joint statement about a previously undisclosed malware used by the Russian military intelligence unit –... Access Rights Review September 4, 2020 Access rights are the permissions granted to a user or application for accessing a file, modifying configurations/settings, or adding or... DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying... What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an... Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack... Benefits of end-to-end encryption & client-side encryption August 31, 2020 End-to-end and client-side encryption are controversial topics for legitimate reasons. While it makes digital forensics more difficult, it also brings many...
“Security Controls Should Harmonize Like Orchestra” – Interview With Ondrej Krehel, LIFARS’ CEO And Founder: Part 1Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise and Ethical Hacking. He actively...
BLOG Steve Durbin, Managing Director at the ISF Interview with Ondrej Krehel About Current Cyber Threats October 1, 2020 ISF Podcast: A Digital Forensics Specialist on Data Breaches It is an unavoidable fact that businesses and organizations’ sensitive information... How to Plan, Conduct, and Manage Tabletop Exercises? September 30, 2020 A successful cyberattack impacts business operations, reputation, customer trust, and profitability. In the cyberspace, threats are evolving continuously, and tactics,... Has Your Home Network Been Compromised!? September 29, 2020 Have you ever wondered if you would notice that your home network was compromised? Attackers can be stealthy, and they... Iranian Script Kiddies Spread Dharma Ransomware via RDP Ports September 28, 2020 A group of script kiddies tied to Iran have been linked to the recent Dharma campaign. These “newbie” hackers are... Communication During Incident Response September 25, 2020 When a cybersecurity incident occurs, it poses a direct threat to your organization’s business continuity. In a crisis, you cannot... VPN Bugs and RDP – Top Exploits Used by Ransomware Gangs September 17, 2020 This year, more cybercrime gangs and ransomware attacks have been witnessed on companies spanning multiple industries. Cybercriminals are always finding... Business Impact Analysis (BIA) September 11, 2020 Modern-day enterprises thrive on making data-oriented decisions to further their business objectives. Such organizations seek to implement a business continuity... Darkside: New Ransomware Operation Demanding Million Dollar Ransom September 10, 2020 Darkside, the latest ransomware operation to emerge has been attacking organizations beginning earlier this month. Darkside’s customized attacks on companies... Drovorub: The Latest Russian Cyber Weapon September 9, 2020 The NSA and the FBI released a joint statement about a previously undisclosed malware used by the Russian military intelligence unit –... Access Rights Review September 4, 2020 Access rights are the permissions granted to a user or application for accessing a file, modifying configurations/settings, or adding or... DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying... What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an... Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack... Benefits of end-to-end encryption & client-side encryption August 31, 2020 End-to-end and client-side encryption are controversial topics for legitimate reasons. While it makes digital forensics more difficult, it also brings many...
Steve Durbin, Managing Director at the ISF Interview with Ondrej Krehel About Current Cyber Threats October 1, 2020 ISF Podcast: A Digital Forensics Specialist on Data Breaches It is an unavoidable fact that businesses and organizations’ sensitive information...
How to Plan, Conduct, and Manage Tabletop Exercises? September 30, 2020 A successful cyberattack impacts business operations, reputation, customer trust, and profitability. In the cyberspace, threats are evolving continuously, and tactics,...
Has Your Home Network Been Compromised!? September 29, 2020 Have you ever wondered if you would notice that your home network was compromised? Attackers can be stealthy, and they...
Iranian Script Kiddies Spread Dharma Ransomware via RDP Ports September 28, 2020 A group of script kiddies tied to Iran have been linked to the recent Dharma campaign. These “newbie” hackers are...
Communication During Incident Response September 25, 2020 When a cybersecurity incident occurs, it poses a direct threat to your organization’s business continuity. In a crisis, you cannot...
VPN Bugs and RDP – Top Exploits Used by Ransomware Gangs September 17, 2020 This year, more cybercrime gangs and ransomware attacks have been witnessed on companies spanning multiple industries. Cybercriminals are always finding...
Business Impact Analysis (BIA) September 11, 2020 Modern-day enterprises thrive on making data-oriented decisions to further their business objectives. Such organizations seek to implement a business continuity...
Darkside: New Ransomware Operation Demanding Million Dollar Ransom September 10, 2020 Darkside, the latest ransomware operation to emerge has been attacking organizations beginning earlier this month. Darkside’s customized attacks on companies...
Drovorub: The Latest Russian Cyber Weapon September 9, 2020 The NSA and the FBI released a joint statement about a previously undisclosed malware used by the Russian military intelligence unit –...
Access Rights Review September 4, 2020 Access rights are the permissions granted to a user or application for accessing a file, modifying configurations/settings, or adding or...
DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying...
What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an...
Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack...
Benefits of end-to-end encryption & client-side encryption August 31, 2020 End-to-end and client-side encryption are controversial topics for legitimate reasons. While it makes digital forensics more difficult, it also brings many...