What You Need to Know About DMARCIn many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an... BLOG Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack... FBI Warns of Windows 7 end-of-life Security Risk August 28, 2020 Earlier this month, the FBI sent out a warning to U.S. private sector partners about the Windows 7 operating system.... €2.9 Million Issued in Fines in Q2 2020 Under GDPR August 27, 2020 The COVID-19 pandemic brought on many problems for organizations from all industries across the world. Organizations that were able to... International forums and organizations for CSIRT/CERT teams August 26, 2020 As threats continue to grow in our cyberspace, setting up a dedicated team for incident response has become an undeniable... Advantages of Cyber Incident Retainers August 25, 2020 Being on constant alert for cyber threats to your organization is a must. A cyber-attack can strike your organization at... Canadian Government’s GCKey Service Targeted by Cyberattacks and Used to Steal COVID-19 Relief Benefits August 25, 2020 Recently, the Canadian government services were targeted by cyberattacks used to steal COVID-19 relief payments. The attacks breached the Canadian... The Overlooked Cyber Risk of Employees Returning to the Offices from Quarantine August 24, 2020 The COVID-19 pandemic has created many challenges for businesses. Employees have been tasked with working remotely from home, in addition... The Types of Two-Step Verification August 21, 2020 Two-step verification is an important feature for keeping accounts safe. However, not all types of two-step verification are equally secure.... A Bootloader Vulnerability Leaves Most Platforms Vulnerable August 17, 2020 Researchers at Eclypsium discovered a vulnerability in an open source bootloader called GRUB, widely used by most Linux distributions... What is CSIRT/CERT Team? August 14, 2020 Irrespective of whether or not you are familiar with incident response, you would have seen that CSIRT and CERT... Phishing for Office 365 logins using Google Cloud Services August 5, 2020 Fraudsters are constantly looking for new ways of collecting login details. Malicious individuals have increasingly turned to public cloud services... Workstation Hardening In a Remote Environment August 4, 2020 Whether you’re sick and can’t make it to work that day or there’s a pandemic affecting the world, working remotely... U.S. DoJ Charges Two Chinese Hackers for Stealing COVID-19 Research and Trade Secrets August 3, 2020 This past week, the U.S. Department of Justice (DoJ) revealed charges against two Chinese nationals. These charges related to their... What is XSS? Concerned User’s Guide to Cross-Site Scripting July 30, 2020 Cross-site scripting is one of the prominent nightmares of every security-conscious web application developer. The term was coined twenty years...
What You Need to Know About DMARCIn many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an...
BLOG Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack... FBI Warns of Windows 7 end-of-life Security Risk August 28, 2020 Earlier this month, the FBI sent out a warning to U.S. private sector partners about the Windows 7 operating system.... €2.9 Million Issued in Fines in Q2 2020 Under GDPR August 27, 2020 The COVID-19 pandemic brought on many problems for organizations from all industries across the world. Organizations that were able to... International forums and organizations for CSIRT/CERT teams August 26, 2020 As threats continue to grow in our cyberspace, setting up a dedicated team for incident response has become an undeniable... Advantages of Cyber Incident Retainers August 25, 2020 Being on constant alert for cyber threats to your organization is a must. A cyber-attack can strike your organization at... Canadian Government’s GCKey Service Targeted by Cyberattacks and Used to Steal COVID-19 Relief Benefits August 25, 2020 Recently, the Canadian government services were targeted by cyberattacks used to steal COVID-19 relief payments. The attacks breached the Canadian... The Overlooked Cyber Risk of Employees Returning to the Offices from Quarantine August 24, 2020 The COVID-19 pandemic has created many challenges for businesses. Employees have been tasked with working remotely from home, in addition... The Types of Two-Step Verification August 21, 2020 Two-step verification is an important feature for keeping accounts safe. However, not all types of two-step verification are equally secure.... A Bootloader Vulnerability Leaves Most Platforms Vulnerable August 17, 2020 Researchers at Eclypsium discovered a vulnerability in an open source bootloader called GRUB, widely used by most Linux distributions... What is CSIRT/CERT Team? August 14, 2020 Irrespective of whether or not you are familiar with incident response, you would have seen that CSIRT and CERT... Phishing for Office 365 logins using Google Cloud Services August 5, 2020 Fraudsters are constantly looking for new ways of collecting login details. Malicious individuals have increasingly turned to public cloud services... Workstation Hardening In a Remote Environment August 4, 2020 Whether you’re sick and can’t make it to work that day or there’s a pandemic affecting the world, working remotely... U.S. DoJ Charges Two Chinese Hackers for Stealing COVID-19 Research and Trade Secrets August 3, 2020 This past week, the U.S. Department of Justice (DoJ) revealed charges against two Chinese nationals. These charges related to their... What is XSS? Concerned User’s Guide to Cross-Site Scripting July 30, 2020 Cross-site scripting is one of the prominent nightmares of every security-conscious web application developer. The term was coined twenty years...
Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack...
FBI Warns of Windows 7 end-of-life Security Risk August 28, 2020 Earlier this month, the FBI sent out a warning to U.S. private sector partners about the Windows 7 operating system....
€2.9 Million Issued in Fines in Q2 2020 Under GDPR August 27, 2020 The COVID-19 pandemic brought on many problems for organizations from all industries across the world. Organizations that were able to...
International forums and organizations for CSIRT/CERT teams August 26, 2020 As threats continue to grow in our cyberspace, setting up a dedicated team for incident response has become an undeniable...
Advantages of Cyber Incident Retainers August 25, 2020 Being on constant alert for cyber threats to your organization is a must. A cyber-attack can strike your organization at...
Canadian Government’s GCKey Service Targeted by Cyberattacks and Used to Steal COVID-19 Relief Benefits August 25, 2020 Recently, the Canadian government services were targeted by cyberattacks used to steal COVID-19 relief payments. The attacks breached the Canadian...
The Overlooked Cyber Risk of Employees Returning to the Offices from Quarantine August 24, 2020 The COVID-19 pandemic has created many challenges for businesses. Employees have been tasked with working remotely from home, in addition...
The Types of Two-Step Verification August 21, 2020 Two-step verification is an important feature for keeping accounts safe. However, not all types of two-step verification are equally secure....
A Bootloader Vulnerability Leaves Most Platforms Vulnerable August 17, 2020 Researchers at Eclypsium discovered a vulnerability in an open source bootloader called GRUB, widely used by most Linux distributions...
What is CSIRT/CERT Team? August 14, 2020 Irrespective of whether or not you are familiar with incident response, you would have seen that CSIRT and CERT...
Phishing for Office 365 logins using Google Cloud Services August 5, 2020 Fraudsters are constantly looking for new ways of collecting login details. Malicious individuals have increasingly turned to public cloud services...
Workstation Hardening In a Remote Environment August 4, 2020 Whether you’re sick and can’t make it to work that day or there’s a pandemic affecting the world, working remotely...
U.S. DoJ Charges Two Chinese Hackers for Stealing COVID-19 Research and Trade Secrets August 3, 2020 This past week, the U.S. Department of Justice (DoJ) revealed charges against two Chinese nationals. These charges related to their...
What is XSS? Concerned User’s Guide to Cross-Site Scripting July 30, 2020 Cross-site scripting is one of the prominent nightmares of every security-conscious web application developer. The term was coined twenty years...