Digital Forensics: Phases and ImportanceDigital forensics is a branch of forensics science that focuses on analyzing and interpreting electronically stored data so that it... BLOG Web App Attacks Grew 251% In Two Years January 14, 2022 In general, online threats are increasing in frequency and severity. Businesses, organizations, governmental bodies, and other groups are finding themselves... Quick Look at New TrickBot Affiliates December 14, 2021 The TrickBot gang, responsible for creating BazarLoader, the Conti ransomware, and the infamous TrickBot trojan, has become even more powerful... The Dangers of BulletProofLink as a Large-Scale Phishing-As-A-Service Scheme October 27, 2021 Phishing is among the most frequent malicious activities deployed by cybercriminals and it is also one of the most effective.... 2021 NYCFE Fraud Conference October 26, 2021 Cyber insurance claims and compliance session will explore cyber insurance claims from the point of view of potential fraud issues... Moving Your Business to the Cloud? Cybercriminals are Hot on Your Heels October 13, 2021 Although cloud adoption has been an inevitable imperative for some time and a driving force in changing how businesses operate,... Ransomware Attacker Offers Employees a Cut if They Install DemonWare on Their Organization’s Systems September 30, 2021 It may seem impossible to think that your employees or peers could knowingly compromise the security of your business. However,... Check Your Company’s Confluence Server ASAP! September 7, 2021 Initially when the Confluence Server Vulnerability was discovered, it was thought to be an internal threat only. A simple search... Attacks Are Getting Pricier: Average Ransomware Payment Ramped Up By 60% January 4, 2021 Ransomware is a severe and recurring cyberattack nowadays. It happens when a cyber threat actor locks a company’s data with... How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... Egregor Ransomware Attacks Creating Uncertainty in Cyberspace December 10, 2020 A relatively newer cyber assault called egregor ransomware attack is making its name in the cyber world fast. It’s becoming... Maze Ransomware: An Infamous Cybercriminal Group Announces to Shut Down its Operations December 1, 2020 In a press release, a notorious cybercriminal group named Maze proclaims to shut down its operations. Ever since the announcement... Ransomware Guide by US CISA and MS-ISAC October 5, 2020 On September 30, 2020, The US Cybersecurity & Infrastructure Security Agency (US CISA) and the Multi-State Information Sharing & Analysis... Zero-day and N-Day Exploits September 24, 2020 Computer exploit is a software that abuses a security vulnerability. It is written by threat actors to help achieve their goals,... Internal v. External Security Personnel September 23, 2020 Over the years, cyberattacks have grown in sophistication and diversity. The threat landscape is continuously evolving, and there does not... VPN Bugs and RDP – Top Exploits Used by Ransomware Gangs September 17, 2020 This year, more cybercrime gangs and ransomware attacks have been witnessed on companies spanning multiple industries. Cybercriminals are always finding...
Digital Forensics: Phases and ImportanceDigital forensics is a branch of forensics science that focuses on analyzing and interpreting electronically stored data so that it...
BLOG Web App Attacks Grew 251% In Two Years January 14, 2022 In general, online threats are increasing in frequency and severity. Businesses, organizations, governmental bodies, and other groups are finding themselves... Quick Look at New TrickBot Affiliates December 14, 2021 The TrickBot gang, responsible for creating BazarLoader, the Conti ransomware, and the infamous TrickBot trojan, has become even more powerful... The Dangers of BulletProofLink as a Large-Scale Phishing-As-A-Service Scheme October 27, 2021 Phishing is among the most frequent malicious activities deployed by cybercriminals and it is also one of the most effective.... 2021 NYCFE Fraud Conference October 26, 2021 Cyber insurance claims and compliance session will explore cyber insurance claims from the point of view of potential fraud issues... Moving Your Business to the Cloud? Cybercriminals are Hot on Your Heels October 13, 2021 Although cloud adoption has been an inevitable imperative for some time and a driving force in changing how businesses operate,... Ransomware Attacker Offers Employees a Cut if They Install DemonWare on Their Organization’s Systems September 30, 2021 It may seem impossible to think that your employees or peers could knowingly compromise the security of your business. However,... Check Your Company’s Confluence Server ASAP! September 7, 2021 Initially when the Confluence Server Vulnerability was discovered, it was thought to be an internal threat only. A simple search... Attacks Are Getting Pricier: Average Ransomware Payment Ramped Up By 60% January 4, 2021 Ransomware is a severe and recurring cyberattack nowadays. It happens when a cyber threat actor locks a company’s data with... How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... Egregor Ransomware Attacks Creating Uncertainty in Cyberspace December 10, 2020 A relatively newer cyber assault called egregor ransomware attack is making its name in the cyber world fast. It’s becoming... Maze Ransomware: An Infamous Cybercriminal Group Announces to Shut Down its Operations December 1, 2020 In a press release, a notorious cybercriminal group named Maze proclaims to shut down its operations. Ever since the announcement... Ransomware Guide by US CISA and MS-ISAC October 5, 2020 On September 30, 2020, The US Cybersecurity & Infrastructure Security Agency (US CISA) and the Multi-State Information Sharing & Analysis... Zero-day and N-Day Exploits September 24, 2020 Computer exploit is a software that abuses a security vulnerability. It is written by threat actors to help achieve their goals,... Internal v. External Security Personnel September 23, 2020 Over the years, cyberattacks have grown in sophistication and diversity. The threat landscape is continuously evolving, and there does not... VPN Bugs and RDP – Top Exploits Used by Ransomware Gangs September 17, 2020 This year, more cybercrime gangs and ransomware attacks have been witnessed on companies spanning multiple industries. Cybercriminals are always finding...
Web App Attacks Grew 251% In Two Years January 14, 2022 In general, online threats are increasing in frequency and severity. Businesses, organizations, governmental bodies, and other groups are finding themselves...
Quick Look at New TrickBot Affiliates December 14, 2021 The TrickBot gang, responsible for creating BazarLoader, the Conti ransomware, and the infamous TrickBot trojan, has become even more powerful...
The Dangers of BulletProofLink as a Large-Scale Phishing-As-A-Service Scheme October 27, 2021 Phishing is among the most frequent malicious activities deployed by cybercriminals and it is also one of the most effective....
2021 NYCFE Fraud Conference October 26, 2021 Cyber insurance claims and compliance session will explore cyber insurance claims from the point of view of potential fraud issues...
Moving Your Business to the Cloud? Cybercriminals are Hot on Your Heels October 13, 2021 Although cloud adoption has been an inevitable imperative for some time and a driving force in changing how businesses operate,...
Ransomware Attacker Offers Employees a Cut if They Install DemonWare on Their Organization’s Systems September 30, 2021 It may seem impossible to think that your employees or peers could knowingly compromise the security of your business. However,...
Check Your Company’s Confluence Server ASAP! September 7, 2021 Initially when the Confluence Server Vulnerability was discovered, it was thought to be an internal threat only. A simple search...
Attacks Are Getting Pricier: Average Ransomware Payment Ramped Up By 60% January 4, 2021 Ransomware is a severe and recurring cyberattack nowadays. It happens when a cyber threat actor locks a company’s data with...
How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place....
Egregor Ransomware Attacks Creating Uncertainty in Cyberspace December 10, 2020 A relatively newer cyber assault called egregor ransomware attack is making its name in the cyber world fast. It’s becoming...
Maze Ransomware: An Infamous Cybercriminal Group Announces to Shut Down its Operations December 1, 2020 In a press release, a notorious cybercriminal group named Maze proclaims to shut down its operations. Ever since the announcement...
Ransomware Guide by US CISA and MS-ISAC October 5, 2020 On September 30, 2020, The US Cybersecurity & Infrastructure Security Agency (US CISA) and the Multi-State Information Sharing & Analysis...
Zero-day and N-Day Exploits September 24, 2020 Computer exploit is a software that abuses a security vulnerability. It is written by threat actors to help achieve their goals,...
Internal v. External Security Personnel September 23, 2020 Over the years, cyberattacks have grown in sophistication and diversity. The threat landscape is continuously evolving, and there does not...
VPN Bugs and RDP – Top Exploits Used by Ransomware Gangs September 17, 2020 This year, more cybercrime gangs and ransomware attacks have been witnessed on companies spanning multiple industries. Cybercriminals are always finding...