Search Results for: encryption incident Knowledge Center Ransomware Fix and Cyber Vaccines – Malware Analysis of Dridex, BitPaymer and DoppelPaymer campaign November 27, 2019 Threat actors are constantly working towards finding new and complex ways to deploy cyber-attacks. The affiliates behind Dridex (Evil Corp)... Blog Post Malware Analysis of Dridex, BitPaymer and DoppelPaymer Campaigns November 26, 2019 Threat actors are constantly working towards finding new and complex ways to deploy cyber-attacks. The affiliates behind Dridex initially used it... Blog Post Benefits of end-to-end encryption & client-side encryption August 31, 2020 End-to-end and client-side encryption are controversial topics for legitimate reasons. While it makes digital forensics more difficult, it also brings many... Blog Post Be Aware of Bluetooth Attack May 1, 2020 Nowadays, there are various Bluetooth headsets, Bluetooth bracelets, car Bluetooth and so on. Since the advent of Bluetooth technology, it... Blog Post Cognizant hacked by Maze Ransomware Attack May 7, 2020 During the Covid-19 pandemic, Cognizant, the technology solution corp was hacked by Maze group causing huge service disruptions for the... Blog Post What You Need to Know About Maze Ransomware Attacks May 3, 2020 Destructive ransomware attacks against large organizations have always been headlines, and unfortunately, they are becoming more common. For example, on... Blog Post Protect Yourself While Sharing & Downloading Files April 13, 2020 Sharing and downloading files, such as documents, programs, pictures, music, and movies is one of the most appreciated aspects of... Blog Post 2021 Has The Emergence Of Babuk Locker Ransomware January 11, 2021 Babuk Locker is a new form of ransomware that just emerged in 2021. This version of ransomware is like other... Blog Post Ransomware leads to death in Germany September 18, 2020 On September 17, 2020, a German patient with a life-threatening condition was redirected to a more distant hospital after the... Blog Post A Bootloader Vulnerability Leaves Most Platforms Vulnerable August 17, 2020 Researchers at Eclypsium discovered a vulnerability in an open source bootloader called GRUB, widely used by most Linux distributions... Blog Post Ransomware Guide by US CISA and MS-ISAC October 5, 2020 On September 30, 2020, The US Cybersecurity & Infrastructure Security Agency (US CISA) and the Multi-State Information Sharing & Analysis... Blog Post Cost of Data Breaches March 30, 2020 Data breaches can cause devastating financial losses and affect an organization’s reputation for decades. To get the accurate cost on... Blog Post Cyberattack Targets U.S. Health Agency During the Outbreak of COVID-19 March 18, 2020 The computer system of the US Department of Health and Human Services (HHS) came under cyberattack last Saturday. Some people... Blog Post Ransomware Gangs Stoop To Cold-Calling Victims When They Restore From Backups Without Paying December 11, 2020 Stooping to further moral degradation, some ransomware gangs are now cold-calling victims in a bid to direct pressure on them.... Blog Post Security Information and Event Management Series Part 4: Selecting a SIEM vendor November 9, 2020 In this last part of our series on SIEM, we will try to provide recommendations on selecting a SIEM vendor....
Knowledge Center Ransomware Fix and Cyber Vaccines – Malware Analysis of Dridex, BitPaymer and DoppelPaymer campaign November 27, 2019 Threat actors are constantly working towards finding new and complex ways to deploy cyber-attacks. The affiliates behind Dridex (Evil Corp)...
Blog Post Malware Analysis of Dridex, BitPaymer and DoppelPaymer Campaigns November 26, 2019 Threat actors are constantly working towards finding new and complex ways to deploy cyber-attacks. The affiliates behind Dridex initially used it...
Blog Post Benefits of end-to-end encryption & client-side encryption August 31, 2020 End-to-end and client-side encryption are controversial topics for legitimate reasons. While it makes digital forensics more difficult, it also brings many...
Blog Post Be Aware of Bluetooth Attack May 1, 2020 Nowadays, there are various Bluetooth headsets, Bluetooth bracelets, car Bluetooth and so on. Since the advent of Bluetooth technology, it...
Blog Post Cognizant hacked by Maze Ransomware Attack May 7, 2020 During the Covid-19 pandemic, Cognizant, the technology solution corp was hacked by Maze group causing huge service disruptions for the...
Blog Post What You Need to Know About Maze Ransomware Attacks May 3, 2020 Destructive ransomware attacks against large organizations have always been headlines, and unfortunately, they are becoming more common. For example, on...
Blog Post Protect Yourself While Sharing & Downloading Files April 13, 2020 Sharing and downloading files, such as documents, programs, pictures, music, and movies is one of the most appreciated aspects of...
Blog Post 2021 Has The Emergence Of Babuk Locker Ransomware January 11, 2021 Babuk Locker is a new form of ransomware that just emerged in 2021. This version of ransomware is like other...
Blog Post Ransomware leads to death in Germany September 18, 2020 On September 17, 2020, a German patient with a life-threatening condition was redirected to a more distant hospital after the...
Blog Post A Bootloader Vulnerability Leaves Most Platforms Vulnerable August 17, 2020 Researchers at Eclypsium discovered a vulnerability in an open source bootloader called GRUB, widely used by most Linux distributions...
Blog Post Ransomware Guide by US CISA and MS-ISAC October 5, 2020 On September 30, 2020, The US Cybersecurity & Infrastructure Security Agency (US CISA) and the Multi-State Information Sharing & Analysis...
Blog Post Cost of Data Breaches March 30, 2020 Data breaches can cause devastating financial losses and affect an organization’s reputation for decades. To get the accurate cost on...
Blog Post Cyberattack Targets U.S. Health Agency During the Outbreak of COVID-19 March 18, 2020 The computer system of the US Department of Health and Human Services (HHS) came under cyberattack last Saturday. Some people...
Blog Post Ransomware Gangs Stoop To Cold-Calling Victims When They Restore From Backups Without Paying December 11, 2020 Stooping to further moral degradation, some ransomware gangs are now cold-calling victims in a bid to direct pressure on them....
Blog Post Security Information and Event Management Series Part 4: Selecting a SIEM vendor November 9, 2020 In this last part of our series on SIEM, we will try to provide recommendations on selecting a SIEM vendor....