REvil Ransomware Gang Warns Stolen Apple Blueprint LeakRecently, the REvil ransomware gang has offered Apple to buy back stolen device blueprints to inhibit the leak. The group... BLOG Chrome Zero-Day Exploit Posted on Twitter – Patch Followed by Similar Exploit Days Later May 3, 2021 A rare Chrome zero-day exploit (remote code execution – RCE) was posted on Twitter earlier in April by security researcher,... How to Remove Ranzy Ransomware? April 28, 2021 Ranzy is simply a ransomware-as-a-service (RaaS) offering. It is usually through email payloads get distributed. Simultaneously, some reports have also... Risk of Hybrid Working – Combining Remote and On-Prem Work April 26, 2021 Even before the Coronavirus pandemic, organizations and businesses were playing with the idea of more remote working environments as a... OVH Fire and Disaster Recovery – Lessons Learnt and What You Can Do to Avoid Data Loss April 23, 2021 The hosting community was recently rocked due to a major fire incident at one of hosting provider OVH’s Strasbourg-based data... Mamba Ransomware Weakness Explored by the FBI April 21, 2021 The first record of a major attack where Mamba ransomware was used is from the end of 2016. According to... NSA Discovers New Critical Vulnerabilities In Exchange Server April 20, 2021 Admins of the Microsoft Exchange Server have been having rough weeks. Yet, matters still do not seem to be getting... Root CA Security Best Practices for Ensuring Trusted and Compliant Interactions April 19, 2021 Your certification authority (CA) is a key component in securing your network. It is the entity that issues, manages, and... Importance of PVLAN and Alternative Solutions April 16, 2021 Security officers and network administrators today are sitting between a rock and a hard place. At the same time that... Cybersecurity Occupation Hit a 0% Unemployment Rate — We Need More Experts April 15, 2021 We started witnessing cyber-related threats over the past few years since the world has shifted rapidly towards digitalization. The emergence... These Threats Are Still Exploiting Vulnerable Exchange Servers April 14, 2021 The exploitation of vulnerabilities in the Microsoft Exchange Server disclosed in March does not cease despite authorities’ calls for updates.... New Code Signing Service sigstore April 13, 2021 Determining the origin and authenticity of open-source code is one of its disadvantages. This is also the reason why it... Threat Hunting on Dark Web April 12, 2021 Implementing a good threat hunting strategy helps a company to identify emerging threats and protect against targeted attacks. Monitoring alone... Purple Fox Malware Now Evolves to Spread Itself Across Windows Machines April 9, 2021 Purple Fox has incorporated a new technique into its arsenal, allowing it to spread itself across windows machines. Essentially, Purple... Dark Web Marketplaces Looking to Dupe Buyers with Illicit COVID-19 Vaccines April 8, 2021 Recently, there has been a surge of activity regarding supposed COVID-19 vaccine sales on dark web marketplaces (DWMs). Fake COVID-19...
REvil Ransomware Gang Warns Stolen Apple Blueprint LeakRecently, the REvil ransomware gang has offered Apple to buy back stolen device blueprints to inhibit the leak. The group...
BLOG Chrome Zero-Day Exploit Posted on Twitter – Patch Followed by Similar Exploit Days Later May 3, 2021 A rare Chrome zero-day exploit (remote code execution – RCE) was posted on Twitter earlier in April by security researcher,... How to Remove Ranzy Ransomware? April 28, 2021 Ranzy is simply a ransomware-as-a-service (RaaS) offering. It is usually through email payloads get distributed. Simultaneously, some reports have also... Risk of Hybrid Working – Combining Remote and On-Prem Work April 26, 2021 Even before the Coronavirus pandemic, organizations and businesses were playing with the idea of more remote working environments as a... OVH Fire and Disaster Recovery – Lessons Learnt and What You Can Do to Avoid Data Loss April 23, 2021 The hosting community was recently rocked due to a major fire incident at one of hosting provider OVH’s Strasbourg-based data... Mamba Ransomware Weakness Explored by the FBI April 21, 2021 The first record of a major attack where Mamba ransomware was used is from the end of 2016. According to... NSA Discovers New Critical Vulnerabilities In Exchange Server April 20, 2021 Admins of the Microsoft Exchange Server have been having rough weeks. Yet, matters still do not seem to be getting... Root CA Security Best Practices for Ensuring Trusted and Compliant Interactions April 19, 2021 Your certification authority (CA) is a key component in securing your network. It is the entity that issues, manages, and... Importance of PVLAN and Alternative Solutions April 16, 2021 Security officers and network administrators today are sitting between a rock and a hard place. At the same time that... Cybersecurity Occupation Hit a 0% Unemployment Rate — We Need More Experts April 15, 2021 We started witnessing cyber-related threats over the past few years since the world has shifted rapidly towards digitalization. The emergence... These Threats Are Still Exploiting Vulnerable Exchange Servers April 14, 2021 The exploitation of vulnerabilities in the Microsoft Exchange Server disclosed in March does not cease despite authorities’ calls for updates.... New Code Signing Service sigstore April 13, 2021 Determining the origin and authenticity of open-source code is one of its disadvantages. This is also the reason why it... Threat Hunting on Dark Web April 12, 2021 Implementing a good threat hunting strategy helps a company to identify emerging threats and protect against targeted attacks. Monitoring alone... Purple Fox Malware Now Evolves to Spread Itself Across Windows Machines April 9, 2021 Purple Fox has incorporated a new technique into its arsenal, allowing it to spread itself across windows machines. Essentially, Purple... Dark Web Marketplaces Looking to Dupe Buyers with Illicit COVID-19 Vaccines April 8, 2021 Recently, there has been a surge of activity regarding supposed COVID-19 vaccine sales on dark web marketplaces (DWMs). Fake COVID-19...
Chrome Zero-Day Exploit Posted on Twitter – Patch Followed by Similar Exploit Days Later May 3, 2021 A rare Chrome zero-day exploit (remote code execution – RCE) was posted on Twitter earlier in April by security researcher,...
How to Remove Ranzy Ransomware? April 28, 2021 Ranzy is simply a ransomware-as-a-service (RaaS) offering. It is usually through email payloads get distributed. Simultaneously, some reports have also...
Risk of Hybrid Working – Combining Remote and On-Prem Work April 26, 2021 Even before the Coronavirus pandemic, organizations and businesses were playing with the idea of more remote working environments as a...
OVH Fire and Disaster Recovery – Lessons Learnt and What You Can Do to Avoid Data Loss April 23, 2021 The hosting community was recently rocked due to a major fire incident at one of hosting provider OVH’s Strasbourg-based data...
Mamba Ransomware Weakness Explored by the FBI April 21, 2021 The first record of a major attack where Mamba ransomware was used is from the end of 2016. According to...
NSA Discovers New Critical Vulnerabilities In Exchange Server April 20, 2021 Admins of the Microsoft Exchange Server have been having rough weeks. Yet, matters still do not seem to be getting...
Root CA Security Best Practices for Ensuring Trusted and Compliant Interactions April 19, 2021 Your certification authority (CA) is a key component in securing your network. It is the entity that issues, manages, and...
Importance of PVLAN and Alternative Solutions April 16, 2021 Security officers and network administrators today are sitting between a rock and a hard place. At the same time that...
Cybersecurity Occupation Hit a 0% Unemployment Rate — We Need More Experts April 15, 2021 We started witnessing cyber-related threats over the past few years since the world has shifted rapidly towards digitalization. The emergence...
These Threats Are Still Exploiting Vulnerable Exchange Servers April 14, 2021 The exploitation of vulnerabilities in the Microsoft Exchange Server disclosed in March does not cease despite authorities’ calls for updates....
New Code Signing Service sigstore April 13, 2021 Determining the origin and authenticity of open-source code is one of its disadvantages. This is also the reason why it...
Threat Hunting on Dark Web April 12, 2021 Implementing a good threat hunting strategy helps a company to identify emerging threats and protect against targeted attacks. Monitoring alone...
Purple Fox Malware Now Evolves to Spread Itself Across Windows Machines April 9, 2021 Purple Fox has incorporated a new technique into its arsenal, allowing it to spread itself across windows machines. Essentially, Purple...
Dark Web Marketplaces Looking to Dupe Buyers with Illicit COVID-19 Vaccines April 8, 2021 Recently, there has been a surge of activity regarding supposed COVID-19 vaccine sales on dark web marketplaces (DWMs). Fake COVID-19...