5 ways To Improve Security Awareness Training The weakest link of the cybersecurity chain is the user. Therefore, expensive antivirus and software may not always hold up... BLOG The Top Six Cyber Security Threats for 2020 August 19, 2020 The estimated cost of cyber crimes across the globe will reach up to $6 trillion a year by 2021, according... A Bootloader Vulnerability Leaves Most Platforms Vulnerable August 17, 2020 Researchers at Eclypsium discovered a vulnerability in an open source bootloader called GRUB, widely used by most Linux distributions... Blackbaud Security Incident August 16, 2020 The cybercrime industry is as vast as it is costly, accounting for trillions of dollars in losses. This constantly growing... Cryptocurrency Mixers and Their Use In Ransomware August 15, 2020 Are cryptocurrencies anonymous? Cryptocurrencies should be both transparent and anonymous. Transparency means that everyone can check all the incoming and... Understanding The Common Vulnerability Scoring System August 10, 2020 A vulnerability is a weakness in hardware, software, personnel, or procedures. However, not all vulnerabilities are equal. Some vulnerabilities have... OilRig APT’s Innovative Backdoor Creates a Pipeline for Data Exfiltration August 6, 2020 A recent slew of cyberattacks has targeted a telecom company in the Middle East. The malicious group behind the attack... Phishing for Office 365 logins using Google Cloud Services August 5, 2020 Fraudsters are constantly looking for new ways of collecting login details. Malicious individuals have increasingly turned to public cloud services... Detecting Malware Capabilities With capa July 29, 2020 What is capa? capa is a new tool recently developed by FireEye. This tool makes some reverse engineering tasks tremendously easy and... Vulnerability Scanning, Penetration Testing, Red Teaming – Know the Difference July 28, 2020 Vulnerability scanning, penetration testing, and red teaming all belong to the branch of proactive security. Experts performing these offensive security... What Is Cybersecurity Exercising? July 27, 2020 Goals? Cybersecurity exercises are designated for companies‘ IT staff, security teams, incident response teams, CSIRTs, CERTs, etc. The training aims... Americans Unconcerned About Data Security During Covid-19 Era July 16, 2020 In this article we will cover the following topics: Citizens lack awareness of cyber security despite growing number of attacks ... Best practices for keeping your Asset Register Up to Date July 15, 2020 It can be an arduous task to keep tracks of different assets that reside within an organization’s inventory. There can... What is DNS Spoofing? July 13, 2020 DNS Spoofing is a type of Cyber Security attack where a user accidentally navigates to an attacker’s website which is... Review of Access Rights July 10, 2020 The ancient way of security was unable to suffice the organization’s protection completely. With different attacks hovering in the network...
5 ways To Improve Security Awareness Training The weakest link of the cybersecurity chain is the user. Therefore, expensive antivirus and software may not always hold up...
BLOG The Top Six Cyber Security Threats for 2020 August 19, 2020 The estimated cost of cyber crimes across the globe will reach up to $6 trillion a year by 2021, according... A Bootloader Vulnerability Leaves Most Platforms Vulnerable August 17, 2020 Researchers at Eclypsium discovered a vulnerability in an open source bootloader called GRUB, widely used by most Linux distributions... Blackbaud Security Incident August 16, 2020 The cybercrime industry is as vast as it is costly, accounting for trillions of dollars in losses. This constantly growing... Cryptocurrency Mixers and Their Use In Ransomware August 15, 2020 Are cryptocurrencies anonymous? Cryptocurrencies should be both transparent and anonymous. Transparency means that everyone can check all the incoming and... Understanding The Common Vulnerability Scoring System August 10, 2020 A vulnerability is a weakness in hardware, software, personnel, or procedures. However, not all vulnerabilities are equal. Some vulnerabilities have... OilRig APT’s Innovative Backdoor Creates a Pipeline for Data Exfiltration August 6, 2020 A recent slew of cyberattacks has targeted a telecom company in the Middle East. The malicious group behind the attack... Phishing for Office 365 logins using Google Cloud Services August 5, 2020 Fraudsters are constantly looking for new ways of collecting login details. Malicious individuals have increasingly turned to public cloud services... Detecting Malware Capabilities With capa July 29, 2020 What is capa? capa is a new tool recently developed by FireEye. This tool makes some reverse engineering tasks tremendously easy and... Vulnerability Scanning, Penetration Testing, Red Teaming – Know the Difference July 28, 2020 Vulnerability scanning, penetration testing, and red teaming all belong to the branch of proactive security. Experts performing these offensive security... What Is Cybersecurity Exercising? July 27, 2020 Goals? Cybersecurity exercises are designated for companies‘ IT staff, security teams, incident response teams, CSIRTs, CERTs, etc. The training aims... Americans Unconcerned About Data Security During Covid-19 Era July 16, 2020 In this article we will cover the following topics: Citizens lack awareness of cyber security despite growing number of attacks ... Best practices for keeping your Asset Register Up to Date July 15, 2020 It can be an arduous task to keep tracks of different assets that reside within an organization’s inventory. There can... What is DNS Spoofing? July 13, 2020 DNS Spoofing is a type of Cyber Security attack where a user accidentally navigates to an attacker’s website which is... Review of Access Rights July 10, 2020 The ancient way of security was unable to suffice the organization’s protection completely. With different attacks hovering in the network...
The Top Six Cyber Security Threats for 2020 August 19, 2020 The estimated cost of cyber crimes across the globe will reach up to $6 trillion a year by 2021, according...
A Bootloader Vulnerability Leaves Most Platforms Vulnerable August 17, 2020 Researchers at Eclypsium discovered a vulnerability in an open source bootloader called GRUB, widely used by most Linux distributions...
Blackbaud Security Incident August 16, 2020 The cybercrime industry is as vast as it is costly, accounting for trillions of dollars in losses. This constantly growing...
Cryptocurrency Mixers and Their Use In Ransomware August 15, 2020 Are cryptocurrencies anonymous? Cryptocurrencies should be both transparent and anonymous. Transparency means that everyone can check all the incoming and...
Understanding The Common Vulnerability Scoring System August 10, 2020 A vulnerability is a weakness in hardware, software, personnel, or procedures. However, not all vulnerabilities are equal. Some vulnerabilities have...
OilRig APT’s Innovative Backdoor Creates a Pipeline for Data Exfiltration August 6, 2020 A recent slew of cyberattacks has targeted a telecom company in the Middle East. The malicious group behind the attack...
Phishing for Office 365 logins using Google Cloud Services August 5, 2020 Fraudsters are constantly looking for new ways of collecting login details. Malicious individuals have increasingly turned to public cloud services...
Detecting Malware Capabilities With capa July 29, 2020 What is capa? capa is a new tool recently developed by FireEye. This tool makes some reverse engineering tasks tremendously easy and...
Vulnerability Scanning, Penetration Testing, Red Teaming – Know the Difference July 28, 2020 Vulnerability scanning, penetration testing, and red teaming all belong to the branch of proactive security. Experts performing these offensive security...
What Is Cybersecurity Exercising? July 27, 2020 Goals? Cybersecurity exercises are designated for companies‘ IT staff, security teams, incident response teams, CSIRTs, CERTs, etc. The training aims...
Americans Unconcerned About Data Security During Covid-19 Era July 16, 2020 In this article we will cover the following topics: Citizens lack awareness of cyber security despite growing number of attacks ...
Best practices for keeping your Asset Register Up to Date July 15, 2020 It can be an arduous task to keep tracks of different assets that reside within an organization’s inventory. There can...
What is DNS Spoofing? July 13, 2020 DNS Spoofing is a type of Cyber Security attack where a user accidentally navigates to an attacker’s website which is...
Review of Access Rights July 10, 2020 The ancient way of security was unable to suffice the organization’s protection completely. With different attacks hovering in the network...