Banks On Alert Though Seemingly The Financial Sector Is Not A Specific Focus Of The Ongoing Hacking CampaignThe ongoing hacking campaign has sent shock waves across the U.S. government and the private sector. Meanwhile, as per bank... BLOG 2021 Has The Emergence Of Babuk Locker Ransomware January 11, 2021 Babuk Locker is a new form of ransomware that just emerged in 2021. This version of ransomware is like other... Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge.... LIFARS Appoints Gaspare J. Marturano as Chief Marketing Officer January 5, 2021 NEW YORK, NY – January 5, 2021 – LIFARS, a leading cybersecurity firm with specialized services in digital forensics, incident... Attacks Are Getting Pricier: Average Ransomware Payment Ramped Up By 60% January 4, 2021 Ransomware is a severe and recurring cyberattack nowadays. It happens when a cyber threat actor locks a company’s data with... E-Land Retail Ransomware Attack December 30, 2020 E-Land Retail, a subsidiary of the E-Land Group conglomerate announced on 23 November of 2020 that it suffered a massive... Supply Chain Attacks And Third-Party Risk Management December 23, 2020 In real terms, third-party risk management is about identifying the vulnerabilities of your outside vendors and determining approaches to overcome... The UEFI/BIOS Firmware is Vulnerable to the New TrickBot Version December 17, 2020 Recently, two security firms named Advanced Intelligence and Eclypsium dropped a bombshell in a joint report. They found that the... How To Lower The Risks Of Privileged Users Compromise? December 16, 2020 Whenever an attacker compromises an appliance, one of his first steps is to collect all the credentials he can find... Guide To Check For Sunburst Vulnerability in SolarWinds And Whether It Was Exploited December 15, 2020 US CISA released an advisory on current activity in which it is explained that a threat actor is actively exploiting... Egregor Ransomware Attacks Creating Uncertainty in Cyberspace December 10, 2020 A relatively newer cyber assault called egregor ransomware attack is making its name in the cyber world fast. It’s becoming... Maze Ransomware: An Infamous Cybercriminal Group Announces to Shut Down its Operations December 1, 2020 In a press release, a notorious cybercriminal group named Maze proclaims to shut down its operations. Ever since the announcement... What Is Obfuscation In Security And What Types of Obfuscation Are There? November 26, 2020 Obfuscation is a mighty technique widely used by hackers as well as security teams all over the globe. They have... FBI: Cyber Threat Actors Stole Source Code From US Government Agencies And Private Companies November 25, 2020 The FBI (Federal Bureau of Investigation) has sent out a security warning on October 14, 2020, regarding insecure SonarQube instances.... What Should An Incident Response Plan Contain? November 24, 2020 The threat landscape businesses are facing worldwide has never been as diverse or as harmful. An organization-wide incident response plan... Security Maturity Models Part 2: What is PRISMA? November 23, 2020 Threat environment in our ever-expanding cyberspace is dynamic. Organizations cannot implement security measures at once and let them continue to...
Banks On Alert Though Seemingly The Financial Sector Is Not A Specific Focus Of The Ongoing Hacking CampaignThe ongoing hacking campaign has sent shock waves across the U.S. government and the private sector. Meanwhile, as per bank...
BLOG 2021 Has The Emergence Of Babuk Locker Ransomware January 11, 2021 Babuk Locker is a new form of ransomware that just emerged in 2021. This version of ransomware is like other... Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge.... LIFARS Appoints Gaspare J. Marturano as Chief Marketing Officer January 5, 2021 NEW YORK, NY – January 5, 2021 – LIFARS, a leading cybersecurity firm with specialized services in digital forensics, incident... Attacks Are Getting Pricier: Average Ransomware Payment Ramped Up By 60% January 4, 2021 Ransomware is a severe and recurring cyberattack nowadays. It happens when a cyber threat actor locks a company’s data with... E-Land Retail Ransomware Attack December 30, 2020 E-Land Retail, a subsidiary of the E-Land Group conglomerate announced on 23 November of 2020 that it suffered a massive... Supply Chain Attacks And Third-Party Risk Management December 23, 2020 In real terms, third-party risk management is about identifying the vulnerabilities of your outside vendors and determining approaches to overcome... The UEFI/BIOS Firmware is Vulnerable to the New TrickBot Version December 17, 2020 Recently, two security firms named Advanced Intelligence and Eclypsium dropped a bombshell in a joint report. They found that the... How To Lower The Risks Of Privileged Users Compromise? December 16, 2020 Whenever an attacker compromises an appliance, one of his first steps is to collect all the credentials he can find... Guide To Check For Sunburst Vulnerability in SolarWinds And Whether It Was Exploited December 15, 2020 US CISA released an advisory on current activity in which it is explained that a threat actor is actively exploiting... Egregor Ransomware Attacks Creating Uncertainty in Cyberspace December 10, 2020 A relatively newer cyber assault called egregor ransomware attack is making its name in the cyber world fast. It’s becoming... Maze Ransomware: An Infamous Cybercriminal Group Announces to Shut Down its Operations December 1, 2020 In a press release, a notorious cybercriminal group named Maze proclaims to shut down its operations. Ever since the announcement... What Is Obfuscation In Security And What Types of Obfuscation Are There? November 26, 2020 Obfuscation is a mighty technique widely used by hackers as well as security teams all over the globe. They have... FBI: Cyber Threat Actors Stole Source Code From US Government Agencies And Private Companies November 25, 2020 The FBI (Federal Bureau of Investigation) has sent out a security warning on October 14, 2020, regarding insecure SonarQube instances.... What Should An Incident Response Plan Contain? November 24, 2020 The threat landscape businesses are facing worldwide has never been as diverse or as harmful. An organization-wide incident response plan... Security Maturity Models Part 2: What is PRISMA? November 23, 2020 Threat environment in our ever-expanding cyberspace is dynamic. Organizations cannot implement security measures at once and let them continue to...
2021 Has The Emergence Of Babuk Locker Ransomware January 11, 2021 Babuk Locker is a new form of ransomware that just emerged in 2021. This version of ransomware is like other...
Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge....
LIFARS Appoints Gaspare J. Marturano as Chief Marketing Officer January 5, 2021 NEW YORK, NY – January 5, 2021 – LIFARS, a leading cybersecurity firm with specialized services in digital forensics, incident...
Attacks Are Getting Pricier: Average Ransomware Payment Ramped Up By 60% January 4, 2021 Ransomware is a severe and recurring cyberattack nowadays. It happens when a cyber threat actor locks a company’s data with...
E-Land Retail Ransomware Attack December 30, 2020 E-Land Retail, a subsidiary of the E-Land Group conglomerate announced on 23 November of 2020 that it suffered a massive...
Supply Chain Attacks And Third-Party Risk Management December 23, 2020 In real terms, third-party risk management is about identifying the vulnerabilities of your outside vendors and determining approaches to overcome...
The UEFI/BIOS Firmware is Vulnerable to the New TrickBot Version December 17, 2020 Recently, two security firms named Advanced Intelligence and Eclypsium dropped a bombshell in a joint report. They found that the...
How To Lower The Risks Of Privileged Users Compromise? December 16, 2020 Whenever an attacker compromises an appliance, one of his first steps is to collect all the credentials he can find...
Guide To Check For Sunburst Vulnerability in SolarWinds And Whether It Was Exploited December 15, 2020 US CISA released an advisory on current activity in which it is explained that a threat actor is actively exploiting...
Egregor Ransomware Attacks Creating Uncertainty in Cyberspace December 10, 2020 A relatively newer cyber assault called egregor ransomware attack is making its name in the cyber world fast. It’s becoming...
Maze Ransomware: An Infamous Cybercriminal Group Announces to Shut Down its Operations December 1, 2020 In a press release, a notorious cybercriminal group named Maze proclaims to shut down its operations. Ever since the announcement...
What Is Obfuscation In Security And What Types of Obfuscation Are There? November 26, 2020 Obfuscation is a mighty technique widely used by hackers as well as security teams all over the globe. They have...
FBI: Cyber Threat Actors Stole Source Code From US Government Agencies And Private Companies November 25, 2020 The FBI (Federal Bureau of Investigation) has sent out a security warning on October 14, 2020, regarding insecure SonarQube instances....
What Should An Incident Response Plan Contain? November 24, 2020 The threat landscape businesses are facing worldwide has never been as diverse or as harmful. An organization-wide incident response plan...
Security Maturity Models Part 2: What is PRISMA? November 23, 2020 Threat environment in our ever-expanding cyberspace is dynamic. Organizations cannot implement security measures at once and let them continue to...