Cyber Security Lessons Learned From The PandemicEven as world starts to open up, many companies are choosing to keep employees home. However, the sudden change in... BLOG DEF CON Hacking Conference: “Hunting for Blue Mockingbird Coinminers” August 5, 2020 Hunting for Blue Mockingbird Coinminers. 100,000+ USD damage. 10,000+ USD mined. 1,000+ infected computers. 100+ malicious artifacts. 10+ malwares… Learn... A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... Gargamel is a tool for acquiring the forensic evidence July 16, 2020 Gargamel is a Windows tool for acquiring the forensic evidence from remote Windows or Linux machines using several different methods.... Importance of Information Systems Documentation for Security – What, How, and Why to Document? July 9, 2020 Today, the risk of security incidents and potential breaches is higher than ever before. Breaches affect large numbers of financial... What is US-Cert and How to benefit from it? July 9, 2020 “Cyber security is a shared responsibility. Working together, we can secure America’s cyberspace.” The United States Computer Emergency Readiness Team... Can Cars Get Hacked? July 3, 2020 The demand for connected-cars has been rising and most of the connected-cars have been sold to customers. A connected car... How does Public Wi-Fi Allow Cyber Thievery? June 26, 2020 Public Wi-Fi is everywhere – parks, coffeeshops, airports, hotels, public transit, libraries, and restaurants. We have also heard time and... Social engineering Life-Cycle June 17, 2020 According to Cert-Uk definition, Social Engineering refers to the manipulation of individuals in order to induce them to carry out... Cybersecurity and The Health Care Industry June 16, 2020 Cybersecurity has become a crucial issue for many organizations but also for private individuals. As well as for regular crime,... The Importance of Threat Intelligence June 12, 2020 Threat Intelligence is data collected and analyzed by an organization in order to understand a threat actor’s motives, targets, and attack... Bots and Cybersecurity June 11, 2020 A bot is a software program that performs an automated task. These tasks are usually repetitive and run without interaction.... Digital Security vs. Digital Privacy June 10, 2020 Due to the lack of uniformly recognized standards, many SME customers will be confused by some security professional terms. They... The Importance of An Information Systems Audit June 9, 2020 While enterprises’ reliance on IT systems continues to increase, IT systems are facing an increasing variety of threats. In the... The effectiveness of cyber security Early Warning Systems (EWS) June 8, 2020 Traditional network-based intrusion detection (IDS) or intrusion prevention (IPS) approaches have proved incapable of handling the upcoming challenges in the...
Cyber Security Lessons Learned From The PandemicEven as world starts to open up, many companies are choosing to keep employees home. However, the sudden change in...
BLOG DEF CON Hacking Conference: “Hunting for Blue Mockingbird Coinminers” August 5, 2020 Hunting for Blue Mockingbird Coinminers. 100,000+ USD damage. 10,000+ USD mined. 1,000+ infected computers. 100+ malicious artifacts. 10+ malwares… Learn... A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... Gargamel is a tool for acquiring the forensic evidence July 16, 2020 Gargamel is a Windows tool for acquiring the forensic evidence from remote Windows or Linux machines using several different methods.... Importance of Information Systems Documentation for Security – What, How, and Why to Document? July 9, 2020 Today, the risk of security incidents and potential breaches is higher than ever before. Breaches affect large numbers of financial... What is US-Cert and How to benefit from it? July 9, 2020 “Cyber security is a shared responsibility. Working together, we can secure America’s cyberspace.” The United States Computer Emergency Readiness Team... Can Cars Get Hacked? July 3, 2020 The demand for connected-cars has been rising and most of the connected-cars have been sold to customers. A connected car... How does Public Wi-Fi Allow Cyber Thievery? June 26, 2020 Public Wi-Fi is everywhere – parks, coffeeshops, airports, hotels, public transit, libraries, and restaurants. We have also heard time and... Social engineering Life-Cycle June 17, 2020 According to Cert-Uk definition, Social Engineering refers to the manipulation of individuals in order to induce them to carry out... Cybersecurity and The Health Care Industry June 16, 2020 Cybersecurity has become a crucial issue for many organizations but also for private individuals. As well as for regular crime,... The Importance of Threat Intelligence June 12, 2020 Threat Intelligence is data collected and analyzed by an organization in order to understand a threat actor’s motives, targets, and attack... Bots and Cybersecurity June 11, 2020 A bot is a software program that performs an automated task. These tasks are usually repetitive and run without interaction.... Digital Security vs. Digital Privacy June 10, 2020 Due to the lack of uniformly recognized standards, many SME customers will be confused by some security professional terms. They... The Importance of An Information Systems Audit June 9, 2020 While enterprises’ reliance on IT systems continues to increase, IT systems are facing an increasing variety of threats. In the... The effectiveness of cyber security Early Warning Systems (EWS) June 8, 2020 Traditional network-based intrusion detection (IDS) or intrusion prevention (IPS) approaches have proved incapable of handling the upcoming challenges in the...
DEF CON Hacking Conference: “Hunting for Blue Mockingbird Coinminers” August 5, 2020 Hunting for Blue Mockingbird Coinminers. 100,000+ USD damage. 10,000+ USD mined. 1,000+ infected computers. 100+ malicious artifacts. 10+ malwares… Learn...
A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every...
Gargamel is a tool for acquiring the forensic evidence July 16, 2020 Gargamel is a Windows tool for acquiring the forensic evidence from remote Windows or Linux machines using several different methods....
Importance of Information Systems Documentation for Security – What, How, and Why to Document? July 9, 2020 Today, the risk of security incidents and potential breaches is higher than ever before. Breaches affect large numbers of financial...
What is US-Cert and How to benefit from it? July 9, 2020 “Cyber security is a shared responsibility. Working together, we can secure America’s cyberspace.” The United States Computer Emergency Readiness Team...
Can Cars Get Hacked? July 3, 2020 The demand for connected-cars has been rising and most of the connected-cars have been sold to customers. A connected car...
How does Public Wi-Fi Allow Cyber Thievery? June 26, 2020 Public Wi-Fi is everywhere – parks, coffeeshops, airports, hotels, public transit, libraries, and restaurants. We have also heard time and...
Social engineering Life-Cycle June 17, 2020 According to Cert-Uk definition, Social Engineering refers to the manipulation of individuals in order to induce them to carry out...
Cybersecurity and The Health Care Industry June 16, 2020 Cybersecurity has become a crucial issue for many organizations but also for private individuals. As well as for regular crime,...
The Importance of Threat Intelligence June 12, 2020 Threat Intelligence is data collected and analyzed by an organization in order to understand a threat actor’s motives, targets, and attack...
Bots and Cybersecurity June 11, 2020 A bot is a software program that performs an automated task. These tasks are usually repetitive and run without interaction....
Digital Security vs. Digital Privacy June 10, 2020 Due to the lack of uniformly recognized standards, many SME customers will be confused by some security professional terms. They...
The Importance of An Information Systems Audit June 9, 2020 While enterprises’ reliance on IT systems continues to increase, IT systems are facing an increasing variety of threats. In the...
The effectiveness of cyber security Early Warning Systems (EWS) June 8, 2020 Traditional network-based intrusion detection (IDS) or intrusion prevention (IPS) approaches have proved incapable of handling the upcoming challenges in the...