Search Results for: printer Knowledge Center A Detailed Analysis of the LockBit Ransomware February 24, 2022 LockBit 2.0 ransomware is one of the most active families in the wild and pretends to implement the fastest encryption... Blog Post LIFARS Alert Flashback and Update: North Korean Trojan KEYMARBLE August 18, 2021 This blog revisits the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) 2018 press release regarding... Blog Post Are open ports a security risk? October 14, 2020 Ports are numbers that are used in TCP and UDP protocols for identification of applications. While some applications use well-known... Blog Post Newly Found Malware Threatens IoT Devices January 12, 2022 A new malware has been identified by AT&T Alien Labs that exposed millions of Internet of Things devices. The BotenaGo... Blog Post Attacks on Internet of Things. How to Reduce Cost and Improve Safety of IoT? June 3, 2020 In the world of technology, the term ‘Internet of Things‘, can be any natural or man-made object that has an... Blog Post 50,000 printers Hacked to Promote YouTube Channel December 2, 2018 A PewDiePie fan hacked 50,000 printers to promote his YouTube channel. PewDiePie, a Swedish YouTuber has been the most subscribed... Knowledge Center 923 words on Windows NTUSER.dat May 20, 2020 With a little bit digging you can discover treasure trove of information, which can be utilized in your digital forensic... Blog Post Mobile Security Issues Affecting Organizations March 25, 2020 Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information is easily transported outside of... Blog Post New NIST Report for IoT Security Advice April 16, 2020 The National Institute of Standards and Technology (NIST) released a report last June to help managers understand and manage the... Blog Post LIFARS Insights: Logon Type Codes April 10, 2020 When monitoring your network, you’ll come across several logon types codes. We know that event Ids 528 and 540 represent... Blog Post Safe Browsing on Social Media March 31, 2020 Social Networking has become the heart and soul of today’s lifestyle. In this era of digitization and social community followers,... Blog Post Cybercriminals Spoof Millions of Printers, Scanners to Spread Malware December 27, 2017 Security researchers have discovered cybercriminals spoofing millions of scanners to launch attacks containing malicious attachments. Cybersecurity researchers at Barracuda first... Blog Post FBI, DHS Unveil Details on New Malware from North Korea June 14, 2018 At a time when President Trump engaged in a historic meeting with North Korea’s Kim Jong Un, a joint DHS_FBI... Blog Post Europol: Ransomware Attacks are a “Global Epidemic’ September 29, 2017 Europol’s premier policy agency has underlined the growing threat of ransomware attacks as an “epidemic”. In its latest annual report... Blog Post CIS Critical Security Controls March 1, 2017 CIS Critical Security Controls specifies and recommends the appropriate actions for organizations to take to improve their critical infrastructure. Although...
Knowledge Center A Detailed Analysis of the LockBit Ransomware February 24, 2022 LockBit 2.0 ransomware is one of the most active families in the wild and pretends to implement the fastest encryption...
Blog Post LIFARS Alert Flashback and Update: North Korean Trojan KEYMARBLE August 18, 2021 This blog revisits the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) 2018 press release regarding...
Blog Post Are open ports a security risk? October 14, 2020 Ports are numbers that are used in TCP and UDP protocols for identification of applications. While some applications use well-known...
Blog Post Newly Found Malware Threatens IoT Devices January 12, 2022 A new malware has been identified by AT&T Alien Labs that exposed millions of Internet of Things devices. The BotenaGo...
Blog Post Attacks on Internet of Things. How to Reduce Cost and Improve Safety of IoT? June 3, 2020 In the world of technology, the term ‘Internet of Things‘, can be any natural or man-made object that has an...
Blog Post 50,000 printers Hacked to Promote YouTube Channel December 2, 2018 A PewDiePie fan hacked 50,000 printers to promote his YouTube channel. PewDiePie, a Swedish YouTuber has been the most subscribed...
Knowledge Center 923 words on Windows NTUSER.dat May 20, 2020 With a little bit digging you can discover treasure trove of information, which can be utilized in your digital forensic...
Blog Post Mobile Security Issues Affecting Organizations March 25, 2020 Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information is easily transported outside of...
Blog Post New NIST Report for IoT Security Advice April 16, 2020 The National Institute of Standards and Technology (NIST) released a report last June to help managers understand and manage the...
Blog Post LIFARS Insights: Logon Type Codes April 10, 2020 When monitoring your network, you’ll come across several logon types codes. We know that event Ids 528 and 540 represent...
Blog Post Safe Browsing on Social Media March 31, 2020 Social Networking has become the heart and soul of today’s lifestyle. In this era of digitization and social community followers,...
Blog Post Cybercriminals Spoof Millions of Printers, Scanners to Spread Malware December 27, 2017 Security researchers have discovered cybercriminals spoofing millions of scanners to launch attacks containing malicious attachments. Cybersecurity researchers at Barracuda first...
Blog Post FBI, DHS Unveil Details on New Malware from North Korea June 14, 2018 At a time when President Trump engaged in a historic meeting with North Korea’s Kim Jong Un, a joint DHS_FBI...
Blog Post Europol: Ransomware Attacks are a “Global Epidemic’ September 29, 2017 Europol’s premier policy agency has underlined the growing threat of ransomware attacks as an “epidemic”. In its latest annual report...
Blog Post CIS Critical Security Controls March 1, 2017 CIS Critical Security Controls specifies and recommends the appropriate actions for organizations to take to improve their critical infrastructure. Although...