Exchange/Outlook Autodiscover Bug Spills 100K+ Email PasswordsA study conducted by Guardicore security researcher Amit Serper recently demonstrated the potential for large-scale credentials compromise owing to a... BLOG How to Secure Windows Remote Desktop Protocol (RDP) in 12 Steps June 10, 2021 As our working environments become increasingly orientated towards remote or hybrid paradigms, so does our reliance on remote technologies such... Common Techniques by Which Malware Makes Itself Persistent January 19, 2021 A hacker wants to keep its malware to stay on the target device, even when the operating system restarts. Do you know... How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... What are Indicators of Compromise (IoCs) Used For? May 27, 2020 Many times when a cyber breach occurs, organizations do not have any evidence. Similar to a Crime that occurs in... What is Cybersecurity and Cybersecurity 101 May 19, 2020 What is Cybersecurity? Cybersecurity refers to the body of technologies, processes and practices designed to protect and defend computers, networks,... Detroit Hospital Network Leaked More Than 100,000 Patient Accounts April 23, 2020 The digitization of medical care has become a megatrend in recent years. It can be presented by the growing development... Unemployment Scams During the Outbreak of COVID-19 April 22, 2020 Japan has just declared a state of emergency across the country, and the number of unemployed in the United States... FBI Warns of Teleconferencing and Online Classroom Hijacking During COVID-19 Pandemic April 11, 2020 To curb the spread of COVID-19, millions of people were forced to stay at home. Zoom has become one of... LIFARS Insights: CVE impacting Windows April 10, 2020 Microsoft releases Software fixes to address various Common Vulnerabilities and Exposures (CVE) as a catalog of security threats, at regular... Small Business Owners Should Watch Out the PII Exposure While Applying for COVID-19 Relief April 7, 2020 A survey of U.S. small businesses showed that 43% of companies said that if they could not obtain rapid cash... LIFARS Insights: Simulating TCP/UDP Client Using Netcat and Ncat April 6, 2020 A client-server model represents the process of how a server communicates with one or more clients. The client begins the... The Personal Info of 4.9 Million Georgians Published Online April 4, 2020 Recently, all the Georgians had experienced a terrible data breach. More than 4.9 million Georgians’ personal information, including full names,... SQLMAP – Authenticate via NTLM under Windows March 19, 2020 Sqlmap is a powerful open-source tool for automating the process of detecting and exploiting SQL injection flaws. It comes preinstalled... Y3K Windows Bug? March 10, 2020 With a Bug ridden 2019, windows expected 2020 to have a great start, trying to take caution over the prior... New Cloud Snooper Attack Could Bypasses Firewall Security Measures February 28, 2020 By investigating malware infections of cloud infrastructure servers hosted in the Amazon Web Services (AWS) cloud, researchers found a sophisticated...
Exchange/Outlook Autodiscover Bug Spills 100K+ Email PasswordsA study conducted by Guardicore security researcher Amit Serper recently demonstrated the potential for large-scale credentials compromise owing to a...
BLOG How to Secure Windows Remote Desktop Protocol (RDP) in 12 Steps June 10, 2021 As our working environments become increasingly orientated towards remote or hybrid paradigms, so does our reliance on remote technologies such... Common Techniques by Which Malware Makes Itself Persistent January 19, 2021 A hacker wants to keep its malware to stay on the target device, even when the operating system restarts. Do you know... How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... What are Indicators of Compromise (IoCs) Used For? May 27, 2020 Many times when a cyber breach occurs, organizations do not have any evidence. Similar to a Crime that occurs in... What is Cybersecurity and Cybersecurity 101 May 19, 2020 What is Cybersecurity? Cybersecurity refers to the body of technologies, processes and practices designed to protect and defend computers, networks,... Detroit Hospital Network Leaked More Than 100,000 Patient Accounts April 23, 2020 The digitization of medical care has become a megatrend in recent years. It can be presented by the growing development... Unemployment Scams During the Outbreak of COVID-19 April 22, 2020 Japan has just declared a state of emergency across the country, and the number of unemployed in the United States... FBI Warns of Teleconferencing and Online Classroom Hijacking During COVID-19 Pandemic April 11, 2020 To curb the spread of COVID-19, millions of people were forced to stay at home. Zoom has become one of... LIFARS Insights: CVE impacting Windows April 10, 2020 Microsoft releases Software fixes to address various Common Vulnerabilities and Exposures (CVE) as a catalog of security threats, at regular... Small Business Owners Should Watch Out the PII Exposure While Applying for COVID-19 Relief April 7, 2020 A survey of U.S. small businesses showed that 43% of companies said that if they could not obtain rapid cash... LIFARS Insights: Simulating TCP/UDP Client Using Netcat and Ncat April 6, 2020 A client-server model represents the process of how a server communicates with one or more clients. The client begins the... The Personal Info of 4.9 Million Georgians Published Online April 4, 2020 Recently, all the Georgians had experienced a terrible data breach. More than 4.9 million Georgians’ personal information, including full names,... SQLMAP – Authenticate via NTLM under Windows March 19, 2020 Sqlmap is a powerful open-source tool for automating the process of detecting and exploiting SQL injection flaws. It comes preinstalled... Y3K Windows Bug? March 10, 2020 With a Bug ridden 2019, windows expected 2020 to have a great start, trying to take caution over the prior... New Cloud Snooper Attack Could Bypasses Firewall Security Measures February 28, 2020 By investigating malware infections of cloud infrastructure servers hosted in the Amazon Web Services (AWS) cloud, researchers found a sophisticated...
How to Secure Windows Remote Desktop Protocol (RDP) in 12 Steps June 10, 2021 As our working environments become increasingly orientated towards remote or hybrid paradigms, so does our reliance on remote technologies such...
Common Techniques by Which Malware Makes Itself Persistent January 19, 2021 A hacker wants to keep its malware to stay on the target device, even when the operating system restarts. Do you know...
How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place....
What are Indicators of Compromise (IoCs) Used For? May 27, 2020 Many times when a cyber breach occurs, organizations do not have any evidence. Similar to a Crime that occurs in...
What is Cybersecurity and Cybersecurity 101 May 19, 2020 What is Cybersecurity? Cybersecurity refers to the body of technologies, processes and practices designed to protect and defend computers, networks,...
Detroit Hospital Network Leaked More Than 100,000 Patient Accounts April 23, 2020 The digitization of medical care has become a megatrend in recent years. It can be presented by the growing development...
Unemployment Scams During the Outbreak of COVID-19 April 22, 2020 Japan has just declared a state of emergency across the country, and the number of unemployed in the United States...
FBI Warns of Teleconferencing and Online Classroom Hijacking During COVID-19 Pandemic April 11, 2020 To curb the spread of COVID-19, millions of people were forced to stay at home. Zoom has become one of...
LIFARS Insights: CVE impacting Windows April 10, 2020 Microsoft releases Software fixes to address various Common Vulnerabilities and Exposures (CVE) as a catalog of security threats, at regular...
Small Business Owners Should Watch Out the PII Exposure While Applying for COVID-19 Relief April 7, 2020 A survey of U.S. small businesses showed that 43% of companies said that if they could not obtain rapid cash...
LIFARS Insights: Simulating TCP/UDP Client Using Netcat and Ncat April 6, 2020 A client-server model represents the process of how a server communicates with one or more clients. The client begins the...
The Personal Info of 4.9 Million Georgians Published Online April 4, 2020 Recently, all the Georgians had experienced a terrible data breach. More than 4.9 million Georgians’ personal information, including full names,...
SQLMAP – Authenticate via NTLM under Windows March 19, 2020 Sqlmap is a powerful open-source tool for automating the process of detecting and exploiting SQL injection flaws. It comes preinstalled...
Y3K Windows Bug? March 10, 2020 With a Bug ridden 2019, windows expected 2020 to have a great start, trying to take caution over the prior...
New Cloud Snooper Attack Could Bypasses Firewall Security Measures February 28, 2020 By investigating malware infections of cloud infrastructure servers hosted in the Amazon Web Services (AWS) cloud, researchers found a sophisticated...