Over 9 million Android Devices Infected by Trojan Disguised as Game AppsAn info-stealing trojan has found its way onto more than 9 million Android devices through Huawei’s AppGallery app store. Over... BLOG Larry Slusser Webinar -Cybersecurity Challenges September 22, 2021 Join Larry Slusser as he discusses Cybersecurity Challenges. This high-level overview, will offer practical advice on how these attacks could... Ondrej Krehel Webinar – Advanced Threat Prevention Defending Against Sophisticated Threat Actors September 21, 2021 Join Dr. Ondrej Krehel Digital Forensics Lead, CEO and Founder, LIFARS as he speaks about Advanced Threat Prevention. Cybercrime thriving... Emerging Litigation Podcast August 19, 2021 This podcast is the audio companion to the Journal on Emerging Issues in Litigation, a collaborative project between HB Litigation... LIFARS Alert Flashback and Update: North Korean Trojan KEYMARBLE August 18, 2021 This blog revisits the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) 2018 press release regarding... DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying... Fake Windows update (Hidden Ransomware) May 31, 2020 Ransomware has developed into a ‘criminal malware of choice’ in recent times, especially when it comes to hitting local government... Mobile Devices Security May 22, 2020 With the existing threats to computers, mobile devices are more prone to cyber threats due to the latest technology which... Cognizant hacked by Maze Ransomware Attack May 7, 2020 During the Covid-19 pandemic, Cognizant, the technology solution corp was hacked by Maze group causing huge service disruptions for the... What You Need to Know About Maze Ransomware Attacks May 3, 2020 Destructive ransomware attacks against large organizations have always been headlines, and unfortunately, they are becoming more common. For example, on... Fake Apps Used As Surveillance May 1, 2020 Cybercriminals are increasingly touting decoy versions of popular applications that include surveillance software, such as Skype and Signal. Apurva Kumar,... Injection Attacks Explained April 24, 2020 Injections are amongst the oldest and most dangerous attacks aimed at web applications and can lead to data theft, data... Unemployment Scams During the Outbreak of COVID-19 April 22, 2020 Japan has just declared a state of emergency across the country, and the number of unemployed in the United States... Google Violates Children’s Online Privacy Protection Act (COPPA) April 15, 2020 Children’s Online Privacy Protection Act (COPPA) was promulgated in 1998. This law is not only one of the few federal... LIFARS Insights: Simulating TCP/UDP Client Using Netcat and Ncat April 6, 2020 A client-server model represents the process of how a server communicates with one or more clients. The client begins the... Threat actors exploiting the novel corona virus epidemic (COVID-19) March 19, 2020 As the WHO has declared COVID-19 to be a global pandemic, we have seen a large increase in the exploitation...
Over 9 million Android Devices Infected by Trojan Disguised as Game AppsAn info-stealing trojan has found its way onto more than 9 million Android devices through Huawei’s AppGallery app store. Over...
BLOG Larry Slusser Webinar -Cybersecurity Challenges September 22, 2021 Join Larry Slusser as he discusses Cybersecurity Challenges. This high-level overview, will offer practical advice on how these attacks could... Ondrej Krehel Webinar – Advanced Threat Prevention Defending Against Sophisticated Threat Actors September 21, 2021 Join Dr. Ondrej Krehel Digital Forensics Lead, CEO and Founder, LIFARS as he speaks about Advanced Threat Prevention. Cybercrime thriving... Emerging Litigation Podcast August 19, 2021 This podcast is the audio companion to the Journal on Emerging Issues in Litigation, a collaborative project between HB Litigation... LIFARS Alert Flashback and Update: North Korean Trojan KEYMARBLE August 18, 2021 This blog revisits the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) 2018 press release regarding... DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying... Fake Windows update (Hidden Ransomware) May 31, 2020 Ransomware has developed into a ‘criminal malware of choice’ in recent times, especially when it comes to hitting local government... Mobile Devices Security May 22, 2020 With the existing threats to computers, mobile devices are more prone to cyber threats due to the latest technology which... Cognizant hacked by Maze Ransomware Attack May 7, 2020 During the Covid-19 pandemic, Cognizant, the technology solution corp was hacked by Maze group causing huge service disruptions for the... What You Need to Know About Maze Ransomware Attacks May 3, 2020 Destructive ransomware attacks against large organizations have always been headlines, and unfortunately, they are becoming more common. For example, on... Fake Apps Used As Surveillance May 1, 2020 Cybercriminals are increasingly touting decoy versions of popular applications that include surveillance software, such as Skype and Signal. Apurva Kumar,... Injection Attacks Explained April 24, 2020 Injections are amongst the oldest and most dangerous attacks aimed at web applications and can lead to data theft, data... Unemployment Scams During the Outbreak of COVID-19 April 22, 2020 Japan has just declared a state of emergency across the country, and the number of unemployed in the United States... Google Violates Children’s Online Privacy Protection Act (COPPA) April 15, 2020 Children’s Online Privacy Protection Act (COPPA) was promulgated in 1998. This law is not only one of the few federal... LIFARS Insights: Simulating TCP/UDP Client Using Netcat and Ncat April 6, 2020 A client-server model represents the process of how a server communicates with one or more clients. The client begins the... Threat actors exploiting the novel corona virus epidemic (COVID-19) March 19, 2020 As the WHO has declared COVID-19 to be a global pandemic, we have seen a large increase in the exploitation...
Larry Slusser Webinar -Cybersecurity Challenges September 22, 2021 Join Larry Slusser as he discusses Cybersecurity Challenges. This high-level overview, will offer practical advice on how these attacks could...
Ondrej Krehel Webinar – Advanced Threat Prevention Defending Against Sophisticated Threat Actors September 21, 2021 Join Dr. Ondrej Krehel Digital Forensics Lead, CEO and Founder, LIFARS as he speaks about Advanced Threat Prevention. Cybercrime thriving...
Emerging Litigation Podcast August 19, 2021 This podcast is the audio companion to the Journal on Emerging Issues in Litigation, a collaborative project between HB Litigation...
LIFARS Alert Flashback and Update: North Korean Trojan KEYMARBLE August 18, 2021 This blog revisits the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) 2018 press release regarding...
DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying...
Fake Windows update (Hidden Ransomware) May 31, 2020 Ransomware has developed into a ‘criminal malware of choice’ in recent times, especially when it comes to hitting local government...
Mobile Devices Security May 22, 2020 With the existing threats to computers, mobile devices are more prone to cyber threats due to the latest technology which...
Cognizant hacked by Maze Ransomware Attack May 7, 2020 During the Covid-19 pandemic, Cognizant, the technology solution corp was hacked by Maze group causing huge service disruptions for the...
What You Need to Know About Maze Ransomware Attacks May 3, 2020 Destructive ransomware attacks against large organizations have always been headlines, and unfortunately, they are becoming more common. For example, on...
Fake Apps Used As Surveillance May 1, 2020 Cybercriminals are increasingly touting decoy versions of popular applications that include surveillance software, such as Skype and Signal. Apurva Kumar,...
Injection Attacks Explained April 24, 2020 Injections are amongst the oldest and most dangerous attacks aimed at web applications and can lead to data theft, data...
Unemployment Scams During the Outbreak of COVID-19 April 22, 2020 Japan has just declared a state of emergency across the country, and the number of unemployed in the United States...
Google Violates Children’s Online Privacy Protection Act (COPPA) April 15, 2020 Children’s Online Privacy Protection Act (COPPA) was promulgated in 1998. This law is not only one of the few federal...
LIFARS Insights: Simulating TCP/UDP Client Using Netcat and Ncat April 6, 2020 A client-server model represents the process of how a server communicates with one or more clients. The client begins the...
Threat actors exploiting the novel corona virus epidemic (COVID-19) March 19, 2020 As the WHO has declared COVID-19 to be a global pandemic, we have seen a large increase in the exploitation...