New Code Signing Service sigstoreDetermining the origin and authenticity of open-source code is one of its disadvantages. This is also the reason why it... BLOG Threat Hunting on Dark Web April 12, 2021 Implementing a good threat hunting strategy helps a company to identify emerging threats and protect against targeted attacks. Monitoring alone... Purple Fox Malware Now Evolves to Spread Itself Across Windows Machines April 9, 2021 Purple Fox has incorporated a new technique into its arsenal, allowing it to spread itself across windows machines. Essentially, Purple... Dark Web Marketplaces Looking to Dupe Buyers with Illicit COVID-19 Vaccines April 8, 2021 Recently, there has been a surge of activity regarding supposed COVID-19 vaccine sales on dark web marketplaces (DWMs). Fake COVID-19... New Self-Replicating Ryuk Ransomware Strain Sparks Fear Among Security Experts and Businesses April 7, 2021 Ryuk has been one of the most active, damaging, and feared ransomware in circulation since August 2018. Now, a new... Three Lessons the Accellion FTA Hack of Shell Reminded Us April 6, 2021 At the beginning of March, we informed about four actively exploited zero-day vulnerabilities in the Accellion file transfer appliance (FTA).... Best Practices and Recommendations for Firewall Rules April 1, 2021 Firewall rules define the active component that decides what Internet traffic it will permit and what Internet traffic it will... Meet the LIFARS Team – Insight Into the Mindset of Zuzana Vargova Part 2 March 31, 2021 Being hacked is the nightmare of every single company, regardless of whether it is a private or public sector. Being... Official PHP Git Repository Was Compromised March 29, 2021 Do you remember the SolarWinds supply chain compromise, was revealed in December 2020? It seems that a similar issue affects... REvil Ransomware Gang Doesn’t Shoot Low, Giant Acer Fell Its Victim March 29, 2021 Even tech companies are a luring target for cybercriminals. Recently, a global high-ranking computer company Acer found snaps of its... Vulnerability Disclosure: Tips for Researchers and Vendors March 26, 2021 Vulnerability disclosure actions is a process whose purpose, principles and importance were presented in our previous article The Underlying Basis... The Year 2020 Witnessed A Growth Of 150% In Ransomware Attacks Against the Backdrop of Pandemic March 25, 2021 The year 2020 witnessed a growth of 150% in ransomware attacks, with a two-fold surge in ransom amount on average.... Cybersecurity Compliance Laws in 2021 – Keeping Your Organization on the Right Side of the Law March 24, 2021 Cybersecurity and regulatory compliance are becoming increasingly entwined, especially regarding businesses for which consumer data is a key resource. Learning... How to Protect Backups Against Ransomware March 23, 2021 It’s estimated that damages as a result of ransomware will reach $20 billion by 2021. Effective and risk-aware backup strategies,... Meet the LIFARS Team – Insight Into the Mindset of Zuzana Vargova Part 1 March 22, 2021 Being hacked is the nightmare of every single company, regardless of whether it is a private or public sector. Being... Risk Assessment: NIST 800-30 vs ISO/IEC 27005 March 19, 2021 Security risk assessment is one of the key phases of the risk management process. Above all, it refers to the...
New Code Signing Service sigstoreDetermining the origin and authenticity of open-source code is one of its disadvantages. This is also the reason why it...
BLOG Threat Hunting on Dark Web April 12, 2021 Implementing a good threat hunting strategy helps a company to identify emerging threats and protect against targeted attacks. Monitoring alone... Purple Fox Malware Now Evolves to Spread Itself Across Windows Machines April 9, 2021 Purple Fox has incorporated a new technique into its arsenal, allowing it to spread itself across windows machines. Essentially, Purple... Dark Web Marketplaces Looking to Dupe Buyers with Illicit COVID-19 Vaccines April 8, 2021 Recently, there has been a surge of activity regarding supposed COVID-19 vaccine sales on dark web marketplaces (DWMs). Fake COVID-19... New Self-Replicating Ryuk Ransomware Strain Sparks Fear Among Security Experts and Businesses April 7, 2021 Ryuk has been one of the most active, damaging, and feared ransomware in circulation since August 2018. Now, a new... Three Lessons the Accellion FTA Hack of Shell Reminded Us April 6, 2021 At the beginning of March, we informed about four actively exploited zero-day vulnerabilities in the Accellion file transfer appliance (FTA).... Best Practices and Recommendations for Firewall Rules April 1, 2021 Firewall rules define the active component that decides what Internet traffic it will permit and what Internet traffic it will... Meet the LIFARS Team – Insight Into the Mindset of Zuzana Vargova Part 2 March 31, 2021 Being hacked is the nightmare of every single company, regardless of whether it is a private or public sector. Being... Official PHP Git Repository Was Compromised March 29, 2021 Do you remember the SolarWinds supply chain compromise, was revealed in December 2020? It seems that a similar issue affects... REvil Ransomware Gang Doesn’t Shoot Low, Giant Acer Fell Its Victim March 29, 2021 Even tech companies are a luring target for cybercriminals. Recently, a global high-ranking computer company Acer found snaps of its... Vulnerability Disclosure: Tips for Researchers and Vendors March 26, 2021 Vulnerability disclosure actions is a process whose purpose, principles and importance were presented in our previous article The Underlying Basis... The Year 2020 Witnessed A Growth Of 150% In Ransomware Attacks Against the Backdrop of Pandemic March 25, 2021 The year 2020 witnessed a growth of 150% in ransomware attacks, with a two-fold surge in ransom amount on average.... Cybersecurity Compliance Laws in 2021 – Keeping Your Organization on the Right Side of the Law March 24, 2021 Cybersecurity and regulatory compliance are becoming increasingly entwined, especially regarding businesses for which consumer data is a key resource. Learning... How to Protect Backups Against Ransomware March 23, 2021 It’s estimated that damages as a result of ransomware will reach $20 billion by 2021. Effective and risk-aware backup strategies,... Meet the LIFARS Team – Insight Into the Mindset of Zuzana Vargova Part 1 March 22, 2021 Being hacked is the nightmare of every single company, regardless of whether it is a private or public sector. Being... Risk Assessment: NIST 800-30 vs ISO/IEC 27005 March 19, 2021 Security risk assessment is one of the key phases of the risk management process. Above all, it refers to the...
Threat Hunting on Dark Web April 12, 2021 Implementing a good threat hunting strategy helps a company to identify emerging threats and protect against targeted attacks. Monitoring alone...
Purple Fox Malware Now Evolves to Spread Itself Across Windows Machines April 9, 2021 Purple Fox has incorporated a new technique into its arsenal, allowing it to spread itself across windows machines. Essentially, Purple...
Dark Web Marketplaces Looking to Dupe Buyers with Illicit COVID-19 Vaccines April 8, 2021 Recently, there has been a surge of activity regarding supposed COVID-19 vaccine sales on dark web marketplaces (DWMs). Fake COVID-19...
New Self-Replicating Ryuk Ransomware Strain Sparks Fear Among Security Experts and Businesses April 7, 2021 Ryuk has been one of the most active, damaging, and feared ransomware in circulation since August 2018. Now, a new...
Three Lessons the Accellion FTA Hack of Shell Reminded Us April 6, 2021 At the beginning of March, we informed about four actively exploited zero-day vulnerabilities in the Accellion file transfer appliance (FTA)....
Best Practices and Recommendations for Firewall Rules April 1, 2021 Firewall rules define the active component that decides what Internet traffic it will permit and what Internet traffic it will...
Meet the LIFARS Team – Insight Into the Mindset of Zuzana Vargova Part 2 March 31, 2021 Being hacked is the nightmare of every single company, regardless of whether it is a private or public sector. Being...
Official PHP Git Repository Was Compromised March 29, 2021 Do you remember the SolarWinds supply chain compromise, was revealed in December 2020? It seems that a similar issue affects...
REvil Ransomware Gang Doesn’t Shoot Low, Giant Acer Fell Its Victim March 29, 2021 Even tech companies are a luring target for cybercriminals. Recently, a global high-ranking computer company Acer found snaps of its...
Vulnerability Disclosure: Tips for Researchers and Vendors March 26, 2021 Vulnerability disclosure actions is a process whose purpose, principles and importance were presented in our previous article The Underlying Basis...
The Year 2020 Witnessed A Growth Of 150% In Ransomware Attacks Against the Backdrop of Pandemic March 25, 2021 The year 2020 witnessed a growth of 150% in ransomware attacks, with a two-fold surge in ransom amount on average....
Cybersecurity Compliance Laws in 2021 – Keeping Your Organization on the Right Side of the Law March 24, 2021 Cybersecurity and regulatory compliance are becoming increasingly entwined, especially regarding businesses for which consumer data is a key resource. Learning...
How to Protect Backups Against Ransomware March 23, 2021 It’s estimated that damages as a result of ransomware will reach $20 billion by 2021. Effective and risk-aware backup strategies,...
Meet the LIFARS Team – Insight Into the Mindset of Zuzana Vargova Part 1 March 22, 2021 Being hacked is the nightmare of every single company, regardless of whether it is a private or public sector. Being...
Risk Assessment: NIST 800-30 vs ISO/IEC 27005 March 19, 2021 Security risk assessment is one of the key phases of the risk management process. Above all, it refers to the...