Introduction To Black Teaming ExercisesFrom startups to enterprises, organizations of all sizes require a structured approach to secure their IT infrastructure. An adequate level... BLOG How to Protect Against TrickBot? January 14, 2021 Trickbot is a malware that started life as a relatively straightforward banking trojan. However, as with most malware, it has... Banks On Alert Though Seemingly The Financial Sector Is Not A Specific Focus Of The Ongoing Hacking Campaign January 13, 2021 The ongoing hacking campaign has sent shock waves across the U.S. government and the private sector. Meanwhile, as per bank... Introducing The New Logchecker Tool Developed By LIFARS January 12, 2021 Threat intelligence is one of the most critical weapons we can use in cyber defense. We constantly collect data about... 2021 Has The Emergence Of Babuk Locker Ransomware January 11, 2021 Babuk Locker is a new form of ransomware that just emerged in 2021. This version of ransomware is like other... Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge.... LIFARS Appoints Gaspare J. Marturano as Chief Marketing Officer January 5, 2021 NEW YORK, NY – January 5, 2021 – LIFARS, a leading cybersecurity firm with specialized services in digital forensics, incident... How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most... Attacks Are Getting Pricier: Average Ransomware Payment Ramped Up By 60% January 4, 2021 Ransomware is a severe and recurring cyberattack nowadays. It happens when a cyber threat actor locks a company’s data with... Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the... E-Land Retail Ransomware Attack December 30, 2020 E-Land Retail, a subsidiary of the E-Land Group conglomerate announced on 23 November of 2020 that it suffered a massive... CISA Urged Admins To Apply The Security Update To Patch Vulnerability In OpenSSL December 29, 2020 On December 8, 2020, OpenSSL issued a security update for a high severity DoS vulnerability that affects the open-source project.... How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... Supply Chain Attacks And Third-Party Risk Management December 23, 2020 In real terms, third-party risk management is about identifying the vulnerabilities of your outside vendors and determining approaches to overcome... Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username... Red Teaming Exercise With Ethical Hackers Of LIFARS December 21, 2020 Can your organization withstand a targeted attack? You can find out easily through Red Teaming – a simulation of a...
Introduction To Black Teaming ExercisesFrom startups to enterprises, organizations of all sizes require a structured approach to secure their IT infrastructure. An adequate level...
BLOG How to Protect Against TrickBot? January 14, 2021 Trickbot is a malware that started life as a relatively straightforward banking trojan. However, as with most malware, it has... Banks On Alert Though Seemingly The Financial Sector Is Not A Specific Focus Of The Ongoing Hacking Campaign January 13, 2021 The ongoing hacking campaign has sent shock waves across the U.S. government and the private sector. Meanwhile, as per bank... Introducing The New Logchecker Tool Developed By LIFARS January 12, 2021 Threat intelligence is one of the most critical weapons we can use in cyber defense. We constantly collect data about... 2021 Has The Emergence Of Babuk Locker Ransomware January 11, 2021 Babuk Locker is a new form of ransomware that just emerged in 2021. This version of ransomware is like other... Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge.... LIFARS Appoints Gaspare J. Marturano as Chief Marketing Officer January 5, 2021 NEW YORK, NY – January 5, 2021 – LIFARS, a leading cybersecurity firm with specialized services in digital forensics, incident... How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most... Attacks Are Getting Pricier: Average Ransomware Payment Ramped Up By 60% January 4, 2021 Ransomware is a severe and recurring cyberattack nowadays. It happens when a cyber threat actor locks a company’s data with... Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the... E-Land Retail Ransomware Attack December 30, 2020 E-Land Retail, a subsidiary of the E-Land Group conglomerate announced on 23 November of 2020 that it suffered a massive... CISA Urged Admins To Apply The Security Update To Patch Vulnerability In OpenSSL December 29, 2020 On December 8, 2020, OpenSSL issued a security update for a high severity DoS vulnerability that affects the open-source project.... How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... Supply Chain Attacks And Third-Party Risk Management December 23, 2020 In real terms, third-party risk management is about identifying the vulnerabilities of your outside vendors and determining approaches to overcome... Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username... Red Teaming Exercise With Ethical Hackers Of LIFARS December 21, 2020 Can your organization withstand a targeted attack? You can find out easily through Red Teaming – a simulation of a...
How to Protect Against TrickBot? January 14, 2021 Trickbot is a malware that started life as a relatively straightforward banking trojan. However, as with most malware, it has...
Banks On Alert Though Seemingly The Financial Sector Is Not A Specific Focus Of The Ongoing Hacking Campaign January 13, 2021 The ongoing hacking campaign has sent shock waves across the U.S. government and the private sector. Meanwhile, as per bank...
Introducing The New Logchecker Tool Developed By LIFARS January 12, 2021 Threat intelligence is one of the most critical weapons we can use in cyber defense. We constantly collect data about...
2021 Has The Emergence Of Babuk Locker Ransomware January 11, 2021 Babuk Locker is a new form of ransomware that just emerged in 2021. This version of ransomware is like other...
Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge....
LIFARS Appoints Gaspare J. Marturano as Chief Marketing Officer January 5, 2021 NEW YORK, NY – January 5, 2021 – LIFARS, a leading cybersecurity firm with specialized services in digital forensics, incident...
How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most...
Attacks Are Getting Pricier: Average Ransomware Payment Ramped Up By 60% January 4, 2021 Ransomware is a severe and recurring cyberattack nowadays. It happens when a cyber threat actor locks a company’s data with...
Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the...
E-Land Retail Ransomware Attack December 30, 2020 E-Land Retail, a subsidiary of the E-Land Group conglomerate announced on 23 November of 2020 that it suffered a massive...
CISA Urged Admins To Apply The Security Update To Patch Vulnerability In OpenSSL December 29, 2020 On December 8, 2020, OpenSSL issued a security update for a high severity DoS vulnerability that affects the open-source project....
How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place....
Supply Chain Attacks And Third-Party Risk Management December 23, 2020 In real terms, third-party risk management is about identifying the vulnerabilities of your outside vendors and determining approaches to overcome...
Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username...
Red Teaming Exercise With Ethical Hackers Of LIFARS December 21, 2020 Can your organization withstand a targeted attack? You can find out easily through Red Teaming – a simulation of a...