Search Results for: attacks are highly targeted Blog Post Advanced Persistent Threats: Are They Dangerous? May 16, 2020 An advanced persistent threat, commonly referred to as an APT, is a type of a cyber attack where an attacker... Blog Post Advanced Persistent Threat (APT) Lazarus’ Latest Campaigns July 20, 2020 What is the first thing that comes to your mind when asked what techniques does North Korea use to threaten... Blog Post SolarWinds Attacker Targets Cloud Service Providers in New Supply Chain Threat December 9, 2021 Earlier this year, a supply chain attack targeted at Solarwinds customers rocked the cybersecurity industry, implicating big tech as well... Blog Post US Government Looking to Fill Cybersecurity Jobs December 27, 2021 Recently, the US Department of Homeland Security announced a new recruitment system, the Cybersecurity Talent Management System (CTMS), aimed at... Blog Post The Dangers of BulletProofLink as a Large-Scale Phishing-As-A-Service Scheme October 27, 2021 Phishing is among the most frequent malicious activities deployed by cybercriminals and it is also one of the most effective.... Blog Post WordPress Plugin Vulnerability Can Wipe Any Site Clean November 30, 2021 A new WordPress plugin vulnerability was identified in Hashthemes Demo Importer. Said plugin is a popular choice among web developers.... Blog Post The Colonial Pipeline – DarkSide Ransomware Attack May 11, 2021 Last week, the United States experienced one of the most significant cyber-attacks in its history. The Department of Homeland Security... Blog Post Justice Department Brings Prolific Ransomware NetWalker to Book February 18, 2021 .Ransomware attacks seem to have become an unavoidable risk of doing business over the last few years. Cunning and proactive... Blog Post What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT... Blog Post Ransomware Gangs Now Threatening to Leak Valuable Information as Part of New Strategy February 11, 2021 Ransomware gangs are shaking up their tactics in the hopes of applying increasing pressure on companies and boosting their payday.... Blog Post Phish Scale – A New Paradigm for Phishing Email Awareness November 19, 2020 Phishing is still an extremely common attack vector directed at individuals and organizations alike. Employees can be targeted specifically in... Blog Post “There Are Highly Skilled Hackers In Slovakia” – Interview With Ondrej Krehel, LIFARS’ CEO And Founder: Part 4 November 5, 2020 Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise and Ethical Hacking. He actively... Blog Post “If You Have Zero Incidents, You Probably Lack Monitoring” – Interview With Ondrej Krehel, LIFARS’ CEO And Founder: Part 3 October 30, 2020 Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise and Ethical Hacking. He actively... Blog Post These Threats Are Still Exploiting Vulnerable Exchange Servers April 14, 2021 The exploitation of vulnerabilities in the Microsoft Exchange Server disclosed in March does not cease despite authorities’ calls for updates.... Blog Post What is Deepfake Phishing and How to Detect It? August 18, 2020 What are deepfakes? Deepfake is quite a recent phenomenon. The term is used to describe the result of artificial intelligence...
Blog Post Advanced Persistent Threats: Are They Dangerous? May 16, 2020 An advanced persistent threat, commonly referred to as an APT, is a type of a cyber attack where an attacker...
Blog Post Advanced Persistent Threat (APT) Lazarus’ Latest Campaigns July 20, 2020 What is the first thing that comes to your mind when asked what techniques does North Korea use to threaten...
Blog Post SolarWinds Attacker Targets Cloud Service Providers in New Supply Chain Threat December 9, 2021 Earlier this year, a supply chain attack targeted at Solarwinds customers rocked the cybersecurity industry, implicating big tech as well...
Blog Post US Government Looking to Fill Cybersecurity Jobs December 27, 2021 Recently, the US Department of Homeland Security announced a new recruitment system, the Cybersecurity Talent Management System (CTMS), aimed at...
Blog Post The Dangers of BulletProofLink as a Large-Scale Phishing-As-A-Service Scheme October 27, 2021 Phishing is among the most frequent malicious activities deployed by cybercriminals and it is also one of the most effective....
Blog Post WordPress Plugin Vulnerability Can Wipe Any Site Clean November 30, 2021 A new WordPress plugin vulnerability was identified in Hashthemes Demo Importer. Said plugin is a popular choice among web developers....
Blog Post The Colonial Pipeline – DarkSide Ransomware Attack May 11, 2021 Last week, the United States experienced one of the most significant cyber-attacks in its history. The Department of Homeland Security...
Blog Post Justice Department Brings Prolific Ransomware NetWalker to Book February 18, 2021 .Ransomware attacks seem to have become an unavoidable risk of doing business over the last few years. Cunning and proactive...
Blog Post What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT...
Blog Post Ransomware Gangs Now Threatening to Leak Valuable Information as Part of New Strategy February 11, 2021 Ransomware gangs are shaking up their tactics in the hopes of applying increasing pressure on companies and boosting their payday....
Blog Post Phish Scale – A New Paradigm for Phishing Email Awareness November 19, 2020 Phishing is still an extremely common attack vector directed at individuals and organizations alike. Employees can be targeted specifically in...
Blog Post “There Are Highly Skilled Hackers In Slovakia” – Interview With Ondrej Krehel, LIFARS’ CEO And Founder: Part 4 November 5, 2020 Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise and Ethical Hacking. He actively...
Blog Post “If You Have Zero Incidents, You Probably Lack Monitoring” – Interview With Ondrej Krehel, LIFARS’ CEO And Founder: Part 3 October 30, 2020 Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise and Ethical Hacking. He actively...
Blog Post These Threats Are Still Exploiting Vulnerable Exchange Servers April 14, 2021 The exploitation of vulnerabilities in the Microsoft Exchange Server disclosed in March does not cease despite authorities’ calls for updates....
Blog Post What is Deepfake Phishing and How to Detect It? August 18, 2020 What are deepfakes? Deepfake is quite a recent phenomenon. The term is used to describe the result of artificial intelligence...