Search Results for: virus and malware Blog Post Security Information and Event Management Series Part 1: Introduction To SIEM October 19, 2020 Cyber-attacks are consistently increasing, and as a result, so is the resulting damage. While attackers can target any organization as... Blog Post Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls... Blog Post Cybersecurity Awareness for Executives September 14, 2020 In an organizational setup, executives sit at the top of the access level hierarchy. Most likely, your company’s executives will... Blog Post How to Shop Safely This Holiday Season – Tips from LIFARS, FBI, FTC December 19, 2019 Holidays is on its way! By the end of the year, the great discounts offered by a lot of shops... Blog Post The Basics of TrickBot Malware July 2, 2020 TrickBot malware is Trojan-type malware to steal sensitive data by using spam emails and also distributed by using Adobe Flash... Blog Post Types of Malware March 6, 2020 Malware is a potential term to define a malicious code written to perform mysterious actions on the target system. Malware... Blog Post Top 10 Most Dangerous Cyber Viruses of All Time April 22, 2020 Top Destructive Cyber Viruses and How to Avoid Them. 1. CryptoLocker. CryptoLocker Ransomware was released in September 2013 and it... Blog Post What are the differences between Static, Dynamic and Hybrid Malware Analysis? November 4, 2020 In 2019, 114 million new malware applications were detected. 43 million new threats were already picked up in the first... Blog Post A Unique Attack – Tycoon ransomware June 25, 2020 A new and undiscovered ransomware is targeting Windows and Linus PCs and it names Tycoon after reference in the code.... Blog Post LIFARS Introduces Cyber Vaccine in the Battle Against Ransomware Attacks April 15, 2020 “LIFARS.com announced the release of Cyber Vaccine, a new weapon against one of the most prolific organized crime phenomena of... Blog Post EKANS Ransomware Is Now Targeting Industrial Control Systems July 24, 2020 Cyber Attackers are using a variety of methods including EKANS ransomware to target industrial control systems (ICS). The ransomware can... Blog Post Sodinokibi Ransomware May 20, 2020 What is Sodinokibi? Sodinokibi Ransomware is also known as REvil or Sodin, discovered by S!Ri. It is a ransomware-type program... Blog Post A Data Breach Can Be Caused by Misuse of VirusTotal October 29, 2019 Recently, Israeli cybersecurity company Otorio Ltd claimed that companies are leaking data such as factory blueprints to intellectual property as... Blog Post Top 10 Cyber Threat Actors in 2020 April 9, 2020 As our sensitive data, bank details, sentimental photos, private messages are priceless, it is important to use the best antivirus... Blog Post E-Land Retail Ransomware Attack December 30, 2020 E-Land Retail, a subsidiary of the E-Land Group conglomerate announced on 23 November of 2020 that it suffered a massive...
Blog Post Security Information and Event Management Series Part 1: Introduction To SIEM October 19, 2020 Cyber-attacks are consistently increasing, and as a result, so is the resulting damage. While attackers can target any organization as...
Blog Post Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls...
Blog Post Cybersecurity Awareness for Executives September 14, 2020 In an organizational setup, executives sit at the top of the access level hierarchy. Most likely, your company’s executives will...
Blog Post How to Shop Safely This Holiday Season – Tips from LIFARS, FBI, FTC December 19, 2019 Holidays is on its way! By the end of the year, the great discounts offered by a lot of shops...
Blog Post The Basics of TrickBot Malware July 2, 2020 TrickBot malware is Trojan-type malware to steal sensitive data by using spam emails and also distributed by using Adobe Flash...
Blog Post Types of Malware March 6, 2020 Malware is a potential term to define a malicious code written to perform mysterious actions on the target system. Malware...
Blog Post Top 10 Most Dangerous Cyber Viruses of All Time April 22, 2020 Top Destructive Cyber Viruses and How to Avoid Them. 1. CryptoLocker. CryptoLocker Ransomware was released in September 2013 and it...
Blog Post What are the differences between Static, Dynamic and Hybrid Malware Analysis? November 4, 2020 In 2019, 114 million new malware applications were detected. 43 million new threats were already picked up in the first...
Blog Post A Unique Attack – Tycoon ransomware June 25, 2020 A new and undiscovered ransomware is targeting Windows and Linus PCs and it names Tycoon after reference in the code....
Blog Post LIFARS Introduces Cyber Vaccine in the Battle Against Ransomware Attacks April 15, 2020 “LIFARS.com announced the release of Cyber Vaccine, a new weapon against one of the most prolific organized crime phenomena of...
Blog Post EKANS Ransomware Is Now Targeting Industrial Control Systems July 24, 2020 Cyber Attackers are using a variety of methods including EKANS ransomware to target industrial control systems (ICS). The ransomware can...
Blog Post Sodinokibi Ransomware May 20, 2020 What is Sodinokibi? Sodinokibi Ransomware is also known as REvil or Sodin, discovered by S!Ri. It is a ransomware-type program...
Blog Post A Data Breach Can Be Caused by Misuse of VirusTotal October 29, 2019 Recently, Israeli cybersecurity company Otorio Ltd claimed that companies are leaking data such as factory blueprints to intellectual property as...
Blog Post Top 10 Cyber Threat Actors in 2020 April 9, 2020 As our sensitive data, bank details, sentimental photos, private messages are priceless, it is important to use the best antivirus...
Blog Post E-Land Retail Ransomware Attack December 30, 2020 E-Land Retail, a subsidiary of the E-Land Group conglomerate announced on 23 November of 2020 that it suffered a massive...