DeathStalker: A threat group utilizing unique methods DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying... BLOG What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an... Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack... Benefits of end-to-end encryption & client-side encryption August 31, 2020 End-to-end and client-side encryption are controversial topics for legitimate reasons. While it makes digital forensics more difficult, it also brings many... FBI Warns of Windows 7 end-of-life Security Risk August 28, 2020 Earlier this month, the FBI sent out a warning to U.S. private sector partners about the Windows 7 operating system.... Backup Policy vs Backup Plan vs Backup Procedure August 27, 2020 Modern-day enterprises implement a flurry of security measures to protect their IT infrastructure from ever-evolving threats. These security measures... €2.9 Million Issued in Fines in Q2 2020 Under GDPR August 27, 2020 The COVID-19 pandemic brought on many problems for organizations from all industries across the world. Organizations that were able to... International forums and organizations for CSIRT/CERT teams August 26, 2020 As threats continue to grow in our cyberspace, setting up a dedicated team for incident response has become an undeniable... Advantages of Cyber Incident Retainers August 25, 2020 Being on constant alert for cyber threats to your organization is a must. A cyber-attack can strike your organization at... Canadian Government’s GCKey Service Targeted by Cyberattacks and Used to Steal COVID-19 Relief Benefits August 25, 2020 Recently, the Canadian government services were targeted by cyberattacks used to steal COVID-19 relief payments. The attacks breached the Canadian... The Overlooked Cyber Risk of Employees Returning to the Offices from Quarantine August 24, 2020 The COVID-19 pandemic has created many challenges for businesses. Employees have been tasked with working remotely from home, in addition... The Types of Two-Step Verification August 21, 2020 Two-step verification is an important feature for keeping accounts safe. However, not all types of two-step verification are equally secure.... Human Resources and Cybersecurity August 21, 2020 The Human Resource (HR) team alongside the cybersecurity team can help make your organization. The role of Human Resources is... 5 ways To Improve Security Awareness Training August 20, 2020 The weakest link of the cybersecurity chain is the user. Therefore, expensive antivirus and software may not always hold up... The Top Six Cyber Security Threats for 2020 August 19, 2020 The estimated cost of cyber crimes across the globe will reach up to $6 trillion a year by 2021, according...
DeathStalker: A threat group utilizing unique methods DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying...
BLOG What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an... Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack... Benefits of end-to-end encryption & client-side encryption August 31, 2020 End-to-end and client-side encryption are controversial topics for legitimate reasons. While it makes digital forensics more difficult, it also brings many... FBI Warns of Windows 7 end-of-life Security Risk August 28, 2020 Earlier this month, the FBI sent out a warning to U.S. private sector partners about the Windows 7 operating system.... Backup Policy vs Backup Plan vs Backup Procedure August 27, 2020 Modern-day enterprises implement a flurry of security measures to protect their IT infrastructure from ever-evolving threats. These security measures... €2.9 Million Issued in Fines in Q2 2020 Under GDPR August 27, 2020 The COVID-19 pandemic brought on many problems for organizations from all industries across the world. Organizations that were able to... International forums and organizations for CSIRT/CERT teams August 26, 2020 As threats continue to grow in our cyberspace, setting up a dedicated team for incident response has become an undeniable... Advantages of Cyber Incident Retainers August 25, 2020 Being on constant alert for cyber threats to your organization is a must. A cyber-attack can strike your organization at... Canadian Government’s GCKey Service Targeted by Cyberattacks and Used to Steal COVID-19 Relief Benefits August 25, 2020 Recently, the Canadian government services were targeted by cyberattacks used to steal COVID-19 relief payments. The attacks breached the Canadian... The Overlooked Cyber Risk of Employees Returning to the Offices from Quarantine August 24, 2020 The COVID-19 pandemic has created many challenges for businesses. Employees have been tasked with working remotely from home, in addition... The Types of Two-Step Verification August 21, 2020 Two-step verification is an important feature for keeping accounts safe. However, not all types of two-step verification are equally secure.... Human Resources and Cybersecurity August 21, 2020 The Human Resource (HR) team alongside the cybersecurity team can help make your organization. The role of Human Resources is... 5 ways To Improve Security Awareness Training August 20, 2020 The weakest link of the cybersecurity chain is the user. Therefore, expensive antivirus and software may not always hold up... The Top Six Cyber Security Threats for 2020 August 19, 2020 The estimated cost of cyber crimes across the globe will reach up to $6 trillion a year by 2021, according...
What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an...
Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack...
Benefits of end-to-end encryption & client-side encryption August 31, 2020 End-to-end and client-side encryption are controversial topics for legitimate reasons. While it makes digital forensics more difficult, it also brings many...
FBI Warns of Windows 7 end-of-life Security Risk August 28, 2020 Earlier this month, the FBI sent out a warning to U.S. private sector partners about the Windows 7 operating system....
Backup Policy vs Backup Plan vs Backup Procedure August 27, 2020 Modern-day enterprises implement a flurry of security measures to protect their IT infrastructure from ever-evolving threats. These security measures...
€2.9 Million Issued in Fines in Q2 2020 Under GDPR August 27, 2020 The COVID-19 pandemic brought on many problems for organizations from all industries across the world. Organizations that were able to...
International forums and organizations for CSIRT/CERT teams August 26, 2020 As threats continue to grow in our cyberspace, setting up a dedicated team for incident response has become an undeniable...
Advantages of Cyber Incident Retainers August 25, 2020 Being on constant alert for cyber threats to your organization is a must. A cyber-attack can strike your organization at...
Canadian Government’s GCKey Service Targeted by Cyberattacks and Used to Steal COVID-19 Relief Benefits August 25, 2020 Recently, the Canadian government services were targeted by cyberattacks used to steal COVID-19 relief payments. The attacks breached the Canadian...
The Overlooked Cyber Risk of Employees Returning to the Offices from Quarantine August 24, 2020 The COVID-19 pandemic has created many challenges for businesses. Employees have been tasked with working remotely from home, in addition...
The Types of Two-Step Verification August 21, 2020 Two-step verification is an important feature for keeping accounts safe. However, not all types of two-step verification are equally secure....
Human Resources and Cybersecurity August 21, 2020 The Human Resource (HR) team alongside the cybersecurity team can help make your organization. The role of Human Resources is...
5 ways To Improve Security Awareness Training August 20, 2020 The weakest link of the cybersecurity chain is the user. Therefore, expensive antivirus and software may not always hold up...
The Top Six Cyber Security Threats for 2020 August 19, 2020 The estimated cost of cyber crimes across the globe will reach up to $6 trillion a year by 2021, according...