Award winning game studio hit by ransomware and threatened to get data leakedIn early February, CD Projekt Red, the game studio behind popular games like The Witcher series, and Cyberpunk 2077 got... BLOG Zero-days in Accellion file transfer app used for data theft March 4, 2021 Back in December 2020, a software vendor Accellion informed about an actively exploited zero-day vulnerability in its File Transfer Appliance... Risk assessment according to NIST SP 800-30 March 3, 2021 The SP 800-30 Guide for Conducting a Risk Assessment is a guideline by the National Institute of Standards and Technology... Widespread supply chain vulnerability exposed as security researcher hacks 35 tech giants March 2, 2021 Recently, an enterprising security researcher, Alex Birsan hacked tech companies and managed to pocket over $130,000 in security bounties. Birsan... Effective Project Management for Successful Cybersecurity Projects March 1, 2021 As per a survey by McKinsey & Co., executing project management techniques has enabled organizational teams to diminish Information Technology... Meet the LIFARS Team – Insight Into the Mindset of Milan Kyselica – Part 1 February 26, 2021 Creating reliable team with right the mindset and mutual trust is essential in every business. In cybersecurity when working with... What is BendyBear? How to Counter the New Malware Cyberespionage Threat From China February 25, 2021 BendyBear malware is a stealth-focused Advanced Persistent Threat (APT) malware. Therefore, its main function is to lie undetected in infected... Perl.com Hijack: It Is No More A Safe Domain February 24, 2021 On January 27, 2021, the Perl Foundation announced that someone hijacked Perl.com, a famous Perl Programming Language website that started... Clubhouse Part 1: Does Exclusivity Imply Security? A Look Under the Hood of Clubhouse Authentication February 23, 2021 In this two-part blog post series, we will look at security aspects of the Clubhouse app. Security in the world... LIFARS Uncovers a Clubhouse Vulnerability, Responsible Disclosure Follows February 22, 2021 New York, February 22, 2021 – LIFARS LLC, a New York City-based leader in cybersecurity services, including incident response, digital... Benefits and Drawbacks of Using LAPS in Active Directory February 22, 2021 What is LAPS in Active Directory? The term LAPS stands for Local Administrator Password Solution. LAPS acts as a password... Emerging Ransomware Groups That Might Be Targeting You Right Now February 19, 2021 Ransomware becomes more and more popular. Emerging Ransomware Groups groups are quickly adopting a double extortion model (Babyk, Egregor, Nefilim). This means... Justice Department Brings Prolific Ransomware NetWalker to Book February 18, 2021 .Ransomware attacks seem to have become an unavoidable risk of doing business over the last few years. Cunning and proactive... Current Tools and Techniques in Digital Forensics February 17, 2021 Digital forensics leverages specialized techniques and tools to investigate various forms of computer-related crimes. Digital crimes may include network intrusion,... The Most Frequent Actively Exploited Vulnerabilities in 2020 February 16, 2021 Every week, security researchers discover and publish many new actively exploited vulnerabilities. In 2020, they disclosed over 18 000 vulnerabilities.... Defense In Depth (DiD): What Is It And Why Is It Important? February 15, 2021 Defense in depth, or DiD, is an information security approach where organizations implement multiple layers of security controls. There will...
Award winning game studio hit by ransomware and threatened to get data leakedIn early February, CD Projekt Red, the game studio behind popular games like The Witcher series, and Cyberpunk 2077 got...
BLOG Zero-days in Accellion file transfer app used for data theft March 4, 2021 Back in December 2020, a software vendor Accellion informed about an actively exploited zero-day vulnerability in its File Transfer Appliance... Risk assessment according to NIST SP 800-30 March 3, 2021 The SP 800-30 Guide for Conducting a Risk Assessment is a guideline by the National Institute of Standards and Technology... Widespread supply chain vulnerability exposed as security researcher hacks 35 tech giants March 2, 2021 Recently, an enterprising security researcher, Alex Birsan hacked tech companies and managed to pocket over $130,000 in security bounties. Birsan... Effective Project Management for Successful Cybersecurity Projects March 1, 2021 As per a survey by McKinsey & Co., executing project management techniques has enabled organizational teams to diminish Information Technology... Meet the LIFARS Team – Insight Into the Mindset of Milan Kyselica – Part 1 February 26, 2021 Creating reliable team with right the mindset and mutual trust is essential in every business. In cybersecurity when working with... What is BendyBear? How to Counter the New Malware Cyberespionage Threat From China February 25, 2021 BendyBear malware is a stealth-focused Advanced Persistent Threat (APT) malware. Therefore, its main function is to lie undetected in infected... Perl.com Hijack: It Is No More A Safe Domain February 24, 2021 On January 27, 2021, the Perl Foundation announced that someone hijacked Perl.com, a famous Perl Programming Language website that started... Clubhouse Part 1: Does Exclusivity Imply Security? A Look Under the Hood of Clubhouse Authentication February 23, 2021 In this two-part blog post series, we will look at security aspects of the Clubhouse app. Security in the world... LIFARS Uncovers a Clubhouse Vulnerability, Responsible Disclosure Follows February 22, 2021 New York, February 22, 2021 – LIFARS LLC, a New York City-based leader in cybersecurity services, including incident response, digital... Benefits and Drawbacks of Using LAPS in Active Directory February 22, 2021 What is LAPS in Active Directory? The term LAPS stands for Local Administrator Password Solution. LAPS acts as a password... Emerging Ransomware Groups That Might Be Targeting You Right Now February 19, 2021 Ransomware becomes more and more popular. Emerging Ransomware Groups groups are quickly adopting a double extortion model (Babyk, Egregor, Nefilim). This means... Justice Department Brings Prolific Ransomware NetWalker to Book February 18, 2021 .Ransomware attacks seem to have become an unavoidable risk of doing business over the last few years. Cunning and proactive... Current Tools and Techniques in Digital Forensics February 17, 2021 Digital forensics leverages specialized techniques and tools to investigate various forms of computer-related crimes. Digital crimes may include network intrusion,... The Most Frequent Actively Exploited Vulnerabilities in 2020 February 16, 2021 Every week, security researchers discover and publish many new actively exploited vulnerabilities. In 2020, they disclosed over 18 000 vulnerabilities.... Defense In Depth (DiD): What Is It And Why Is It Important? February 15, 2021 Defense in depth, or DiD, is an information security approach where organizations implement multiple layers of security controls. There will...
Zero-days in Accellion file transfer app used for data theft March 4, 2021 Back in December 2020, a software vendor Accellion informed about an actively exploited zero-day vulnerability in its File Transfer Appliance...
Risk assessment according to NIST SP 800-30 March 3, 2021 The SP 800-30 Guide for Conducting a Risk Assessment is a guideline by the National Institute of Standards and Technology...
Widespread supply chain vulnerability exposed as security researcher hacks 35 tech giants March 2, 2021 Recently, an enterprising security researcher, Alex Birsan hacked tech companies and managed to pocket over $130,000 in security bounties. Birsan...
Effective Project Management for Successful Cybersecurity Projects March 1, 2021 As per a survey by McKinsey & Co., executing project management techniques has enabled organizational teams to diminish Information Technology...
Meet the LIFARS Team – Insight Into the Mindset of Milan Kyselica – Part 1 February 26, 2021 Creating reliable team with right the mindset and mutual trust is essential in every business. In cybersecurity when working with...
What is BendyBear? How to Counter the New Malware Cyberespionage Threat From China February 25, 2021 BendyBear malware is a stealth-focused Advanced Persistent Threat (APT) malware. Therefore, its main function is to lie undetected in infected...
Perl.com Hijack: It Is No More A Safe Domain February 24, 2021 On January 27, 2021, the Perl Foundation announced that someone hijacked Perl.com, a famous Perl Programming Language website that started...
Clubhouse Part 1: Does Exclusivity Imply Security? A Look Under the Hood of Clubhouse Authentication February 23, 2021 In this two-part blog post series, we will look at security aspects of the Clubhouse app. Security in the world...
LIFARS Uncovers a Clubhouse Vulnerability, Responsible Disclosure Follows February 22, 2021 New York, February 22, 2021 – LIFARS LLC, a New York City-based leader in cybersecurity services, including incident response, digital...
Benefits and Drawbacks of Using LAPS in Active Directory February 22, 2021 What is LAPS in Active Directory? The term LAPS stands for Local Administrator Password Solution. LAPS acts as a password...
Emerging Ransomware Groups That Might Be Targeting You Right Now February 19, 2021 Ransomware becomes more and more popular. Emerging Ransomware Groups groups are quickly adopting a double extortion model (Babyk, Egregor, Nefilim). This means...
Justice Department Brings Prolific Ransomware NetWalker to Book February 18, 2021 .Ransomware attacks seem to have become an unavoidable risk of doing business over the last few years. Cunning and proactive...
Current Tools and Techniques in Digital Forensics February 17, 2021 Digital forensics leverages specialized techniques and tools to investigate various forms of computer-related crimes. Digital crimes may include network intrusion,...
The Most Frequent Actively Exploited Vulnerabilities in 2020 February 16, 2021 Every week, security researchers discover and publish many new actively exploited vulnerabilities. In 2020, they disclosed over 18 000 vulnerabilities....
Defense In Depth (DiD): What Is It And Why Is It Important? February 15, 2021 Defense in depth, or DiD, is an information security approach where organizations implement multiple layers of security controls. There will...