A Unique Attack – Tycoon ransomwareA new and undiscovered ransomware is targeting Windows and Linus PCs and it names Tycoon after reference in the code.... BLOG Business Email Compromise (BEC) June 19, 2020 Business Email Compromise (BEC) is also known as Email Account Compromise (EAC) which has caused financial losses in the billions... A Flaw in VMware Cloud June 17, 2020 Penetration testers at Citadel discovered a new vulnerability in VMware’s Cloud Directory platform on April 9. They discovered during auditing... Cybersecurity and The Health Care Industry June 16, 2020 Cybersecurity has become a crucial issue for many organizations but also for private individuals. As well as for regular crime,... The Importance of Threat Intelligence June 12, 2020 Threat Intelligence is data collected and analyzed by an organization in order to understand a threat actor’s motives, targets, and attack... The Importance of An Information Systems Audit June 9, 2020 While enterprises’ reliance on IT systems continues to increase, IT systems are facing an increasing variety of threats. In the... The effectiveness of cyber security Early Warning Systems (EWS) June 8, 2020 Traditional network-based intrusion detection (IDS) or intrusion prevention (IPS) approaches have proved incapable of handling the upcoming challenges in the... Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every... 10 Ransomware Strains by Advanced Cyber Gangs June 5, 2020 With the Coronavirus pandemic, healthcare organizations, their suppliers, government agencies, and educational software providers have been targeted by cyber criminal... Impact of Data Breaches on Businesses Reputation and How to Minimize Risk June 3, 2020 To avoid a major loss post a data breach, every organization must have an incident response plan and engage in... What You Should Know About Cryptojacking June 2, 2020 Cryptojacking is a notorious method of tricking the victim to perform the crime of mining the cryptocurrency for the attacker.... Key Cyber Risks and Threats June 1, 2020 No matter how small your business is, there should be an awareness and basic understanding of the threats posed in... Fake Windows update (Hidden Ransomware) May 31, 2020 Ransomware has developed into a ‘criminal malware of choice’ in recent times, especially when it comes to hitting local government... Do You Have a Data Loss Prevention (DLP)? May 29, 2020 In a normal course, business might send many kinds of data across the network. These might include sensitive information like... What are Indicators of Compromise (IoCs) Used For? May 27, 2020 Many times when a cyber breach occurs, organizations do not have any evidence. Similar to a Crime that occurs in...
A Unique Attack – Tycoon ransomwareA new and undiscovered ransomware is targeting Windows and Linus PCs and it names Tycoon after reference in the code....
BLOG Business Email Compromise (BEC) June 19, 2020 Business Email Compromise (BEC) is also known as Email Account Compromise (EAC) which has caused financial losses in the billions... A Flaw in VMware Cloud June 17, 2020 Penetration testers at Citadel discovered a new vulnerability in VMware’s Cloud Directory platform on April 9. They discovered during auditing... Cybersecurity and The Health Care Industry June 16, 2020 Cybersecurity has become a crucial issue for many organizations but also for private individuals. As well as for regular crime,... The Importance of Threat Intelligence June 12, 2020 Threat Intelligence is data collected and analyzed by an organization in order to understand a threat actor’s motives, targets, and attack... The Importance of An Information Systems Audit June 9, 2020 While enterprises’ reliance on IT systems continues to increase, IT systems are facing an increasing variety of threats. In the... The effectiveness of cyber security Early Warning Systems (EWS) June 8, 2020 Traditional network-based intrusion detection (IDS) or intrusion prevention (IPS) approaches have proved incapable of handling the upcoming challenges in the... Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every... 10 Ransomware Strains by Advanced Cyber Gangs June 5, 2020 With the Coronavirus pandemic, healthcare organizations, their suppliers, government agencies, and educational software providers have been targeted by cyber criminal... Impact of Data Breaches on Businesses Reputation and How to Minimize Risk June 3, 2020 To avoid a major loss post a data breach, every organization must have an incident response plan and engage in... What You Should Know About Cryptojacking June 2, 2020 Cryptojacking is a notorious method of tricking the victim to perform the crime of mining the cryptocurrency for the attacker.... Key Cyber Risks and Threats June 1, 2020 No matter how small your business is, there should be an awareness and basic understanding of the threats posed in... Fake Windows update (Hidden Ransomware) May 31, 2020 Ransomware has developed into a ‘criminal malware of choice’ in recent times, especially when it comes to hitting local government... Do You Have a Data Loss Prevention (DLP)? May 29, 2020 In a normal course, business might send many kinds of data across the network. These might include sensitive information like... What are Indicators of Compromise (IoCs) Used For? May 27, 2020 Many times when a cyber breach occurs, organizations do not have any evidence. Similar to a Crime that occurs in...
Business Email Compromise (BEC) June 19, 2020 Business Email Compromise (BEC) is also known as Email Account Compromise (EAC) which has caused financial losses in the billions...
A Flaw in VMware Cloud June 17, 2020 Penetration testers at Citadel discovered a new vulnerability in VMware’s Cloud Directory platform on April 9. They discovered during auditing...
Cybersecurity and The Health Care Industry June 16, 2020 Cybersecurity has become a crucial issue for many organizations but also for private individuals. As well as for regular crime,...
The Importance of Threat Intelligence June 12, 2020 Threat Intelligence is data collected and analyzed by an organization in order to understand a threat actor’s motives, targets, and attack...
The Importance of An Information Systems Audit June 9, 2020 While enterprises’ reliance on IT systems continues to increase, IT systems are facing an increasing variety of threats. In the...
The effectiveness of cyber security Early Warning Systems (EWS) June 8, 2020 Traditional network-based intrusion detection (IDS) or intrusion prevention (IPS) approaches have proved incapable of handling the upcoming challenges in the...
Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every...
10 Ransomware Strains by Advanced Cyber Gangs June 5, 2020 With the Coronavirus pandemic, healthcare organizations, their suppliers, government agencies, and educational software providers have been targeted by cyber criminal...
Impact of Data Breaches on Businesses Reputation and How to Minimize Risk June 3, 2020 To avoid a major loss post a data breach, every organization must have an incident response plan and engage in...
What You Should Know About Cryptojacking June 2, 2020 Cryptojacking is a notorious method of tricking the victim to perform the crime of mining the cryptocurrency for the attacker....
Key Cyber Risks and Threats June 1, 2020 No matter how small your business is, there should be an awareness and basic understanding of the threats posed in...
Fake Windows update (Hidden Ransomware) May 31, 2020 Ransomware has developed into a ‘criminal malware of choice’ in recent times, especially when it comes to hitting local government...
Do You Have a Data Loss Prevention (DLP)? May 29, 2020 In a normal course, business might send many kinds of data across the network. These might include sensitive information like...
What are Indicators of Compromise (IoCs) Used For? May 27, 2020 Many times when a cyber breach occurs, organizations do not have any evidence. Similar to a Crime that occurs in...