Security RecommendationsOur thoughts are with everyone across Europe, and the world, during these distressing times. Here are some general recommendations for... BLOG SecurityScorecard acquires LIFARS to establish a DFIR services practice February 7, 2022 Our world is changing rapidly. More than ever, organizations are reliant on digital technologies to do business. Cyber threats continue... A Detailed Analysis of WhisperGate Targeting Ukrainian Organizations January 20, 2022 Microsoft reported evidence of destructive malware targeting organizations in Ukraine starting from January 13 [1]. The LIFARS threat intelligence team... Log4j Vulnerability Causes Panic Across the Internet December 14, 2021 The Log4j zero-day vulnerability is a considerable risk for internet security. Companies worldwide are scrambling to update their servers and... Check Your Company’s Confluence Server ASAP! September 7, 2021 Initially when the Confluence Server Vulnerability was discovered, it was thought to be an internal threat only. A simple search... PowerShell Remoting and WMI risks July 13, 2021 What is PowerShell Remoting? PowerShell Remoting uses Windows Remote Management (WinRM), which is the Microsoft implementation of the Web Services... Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more... Ransomware Gangs Recruiting Affiliates Now by Creating Websites July 7, 2021 Ransomware gangs have begun to promote their services by other methods after two notable Russian-speaking forums prohibited ransomware-related topics. One... PrintNightmare: A Critical Windows Print Spooler Vulnerability July 6, 2021 On June 30th, 2021 the CERT Coordination Center released VulNote for a critical remote code execution vulnerability in the Windows... The Secure Access Service Edge (SASE) Security Model July 2, 2021 As we shift further towards remote working environments, it’s becoming clear that we’ve passed the point of no return. We... Do deep fake cyber-attacks pose an imminent threat? July 1, 2021 We’ve all seen the videos before. Today, most deepfake videos we see consist of influential people or celebrities being realistically... Best Practices for Modern SOC June 30, 2021 The Security Operations Centre (SOC) assists in detecting, monitoring and also responding to cyber threats. In summary, it provides services... FBI Warns of Conti Ransomware Attacks on U.S. Healthcare Networks June 29, 2021 At least 16 Conti ransomware attacks on U.S. healthcare and first responder networks have been identified by the Federal Bureau... CLOP Ransomware Suspects Busted in Ukraine – Money and Motors Seized June 28, 2021 Ukrainian police have arrested six people allegedly linked to the infamous CLOP ransomware gang. The police have finally reached them... The Lorenz Ransomware Gang Demand High Ransoms June 25, 2021 The Lorenz Gang Over the past few months, the Lorenz ransomware threat (the encryptor is believed to be the same... Increasing Maturity Of Cybersecurity Awareness Programs June 25, 2021 In today’s digital environment, businesses, from small enterprises to established corporations, are constantly exposed to security risks. Most are continuing...
Security RecommendationsOur thoughts are with everyone across Europe, and the world, during these distressing times. Here are some general recommendations for...
BLOG SecurityScorecard acquires LIFARS to establish a DFIR services practice February 7, 2022 Our world is changing rapidly. More than ever, organizations are reliant on digital technologies to do business. Cyber threats continue... A Detailed Analysis of WhisperGate Targeting Ukrainian Organizations January 20, 2022 Microsoft reported evidence of destructive malware targeting organizations in Ukraine starting from January 13 [1]. The LIFARS threat intelligence team... Log4j Vulnerability Causes Panic Across the Internet December 14, 2021 The Log4j zero-day vulnerability is a considerable risk for internet security. Companies worldwide are scrambling to update their servers and... Check Your Company’s Confluence Server ASAP! September 7, 2021 Initially when the Confluence Server Vulnerability was discovered, it was thought to be an internal threat only. A simple search... PowerShell Remoting and WMI risks July 13, 2021 What is PowerShell Remoting? PowerShell Remoting uses Windows Remote Management (WinRM), which is the Microsoft implementation of the Web Services... Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more... Ransomware Gangs Recruiting Affiliates Now by Creating Websites July 7, 2021 Ransomware gangs have begun to promote their services by other methods after two notable Russian-speaking forums prohibited ransomware-related topics. One... PrintNightmare: A Critical Windows Print Spooler Vulnerability July 6, 2021 On June 30th, 2021 the CERT Coordination Center released VulNote for a critical remote code execution vulnerability in the Windows... The Secure Access Service Edge (SASE) Security Model July 2, 2021 As we shift further towards remote working environments, it’s becoming clear that we’ve passed the point of no return. We... Do deep fake cyber-attacks pose an imminent threat? July 1, 2021 We’ve all seen the videos before. Today, most deepfake videos we see consist of influential people or celebrities being realistically... Best Practices for Modern SOC June 30, 2021 The Security Operations Centre (SOC) assists in detecting, monitoring and also responding to cyber threats. In summary, it provides services... FBI Warns of Conti Ransomware Attacks on U.S. Healthcare Networks June 29, 2021 At least 16 Conti ransomware attacks on U.S. healthcare and first responder networks have been identified by the Federal Bureau... CLOP Ransomware Suspects Busted in Ukraine – Money and Motors Seized June 28, 2021 Ukrainian police have arrested six people allegedly linked to the infamous CLOP ransomware gang. The police have finally reached them... The Lorenz Ransomware Gang Demand High Ransoms June 25, 2021 The Lorenz Gang Over the past few months, the Lorenz ransomware threat (the encryptor is believed to be the same... Increasing Maturity Of Cybersecurity Awareness Programs June 25, 2021 In today’s digital environment, businesses, from small enterprises to established corporations, are constantly exposed to security risks. Most are continuing...
SecurityScorecard acquires LIFARS to establish a DFIR services practice February 7, 2022 Our world is changing rapidly. More than ever, organizations are reliant on digital technologies to do business. Cyber threats continue...
A Detailed Analysis of WhisperGate Targeting Ukrainian Organizations January 20, 2022 Microsoft reported evidence of destructive malware targeting organizations in Ukraine starting from January 13 [1]. The LIFARS threat intelligence team...
Log4j Vulnerability Causes Panic Across the Internet December 14, 2021 The Log4j zero-day vulnerability is a considerable risk for internet security. Companies worldwide are scrambling to update their servers and...
Check Your Company’s Confluence Server ASAP! September 7, 2021 Initially when the Confluence Server Vulnerability was discovered, it was thought to be an internal threat only. A simple search...
PowerShell Remoting and WMI risks July 13, 2021 What is PowerShell Remoting? PowerShell Remoting uses Windows Remote Management (WinRM), which is the Microsoft implementation of the Web Services...
Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more...
Ransomware Gangs Recruiting Affiliates Now by Creating Websites July 7, 2021 Ransomware gangs have begun to promote their services by other methods after two notable Russian-speaking forums prohibited ransomware-related topics. One...
PrintNightmare: A Critical Windows Print Spooler Vulnerability July 6, 2021 On June 30th, 2021 the CERT Coordination Center released VulNote for a critical remote code execution vulnerability in the Windows...
The Secure Access Service Edge (SASE) Security Model July 2, 2021 As we shift further towards remote working environments, it’s becoming clear that we’ve passed the point of no return. We...
Do deep fake cyber-attacks pose an imminent threat? July 1, 2021 We’ve all seen the videos before. Today, most deepfake videos we see consist of influential people or celebrities being realistically...
Best Practices for Modern SOC June 30, 2021 The Security Operations Centre (SOC) assists in detecting, monitoring and also responding to cyber threats. In summary, it provides services...
FBI Warns of Conti Ransomware Attacks on U.S. Healthcare Networks June 29, 2021 At least 16 Conti ransomware attacks on U.S. healthcare and first responder networks have been identified by the Federal Bureau...
CLOP Ransomware Suspects Busted in Ukraine – Money and Motors Seized June 28, 2021 Ukrainian police have arrested six people allegedly linked to the infamous CLOP ransomware gang. The police have finally reached them...
The Lorenz Ransomware Gang Demand High Ransoms June 25, 2021 The Lorenz Gang Over the past few months, the Lorenz ransomware threat (the encryptor is believed to be the same...
Increasing Maturity Of Cybersecurity Awareness Programs June 25, 2021 In today’s digital environment, businesses, from small enterprises to established corporations, are constantly exposed to security risks. Most are continuing...