Security RecommendationsOur thoughts are with everyone across Europe, and the world, during these distressing times. Here are some general recommendations for... BLOG FamousSparrow Advanced Persistent Threat Group Rushes to Hotels, Businesses, and Governments. October 11, 2021 Recently, researchers at an internet security company named ESET discovered new cyber-espionage and advanced persistent threat group FamousSparrow. Although the... Groove Ransomware Gang Attracts Affiliates by Attempting New Tactic October 5, 2021 Recently, a new ransomware gang named Groove has sparked the resurgence of cybercrimes to deal a blow to cybersecurity experts.... Data Breach: Attackers Breached Systems of United Nations October 4, 2021 As the shocking news recently emerged that hackers breached the computer networks of the United Nations, it sent shockwaves across... Microsoft Issued a Warning to Its Azure Customers of a Flaw That Might Allow Hackers to Access Data September 23, 2021 On September 8, 2021, Microsoft issued a warning to its Azure customers) cloud computing customers) of a vulnerability. In essence,... Saudi Aramco Acknowledged Data Leak to Attack on Supplier August 24, 2021 In late July 2021, Saudi Aramco acknowledged a data leak of its company from one of its contractors. The oil... What To Look For When Selecting a DLP Solution For Your Business? June 1, 2021 According to IBM, the average data breach cost organization’s an average of $3.86 million per incident. However, organizations are only... Latest Credential Data Breaches and What to Do to Not Get Compromised? May 25, 2021 According to Verizon’s 2021 Data Breach Investigation Report, the median data breach costs companies over $21,000 with some numbering in... REvil Ransomware Gang Warns Stolen Apple Blueprint Leak May 4, 2021 Recently, the REvil ransomware gang has offered Apple to buy back stolen device blueprints to inhibit the leak. The group... Three Lessons the Accellion FTA Hack of Shell Reminded Us April 6, 2021 At the beginning of March, we informed about four actively exploited zero-day vulnerabilities in the Accellion file transfer appliance (FTA).... Zero-days in Accellion file transfer app used for data theft March 4, 2021 Back in December 2020, a software vendor Accellion informed about an actively exploited zero-day vulnerability in its File Transfer Appliance... Common Techniques by Which Malware Makes Itself Persistent January 19, 2021 A hacker wants to keep its malware to stay on the target device, even when the operating system restarts. Do you know... How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... What Is The Average Time To Detect Data Breaches And How To Reduce It? November 3, 2020 On this information superhighway we’re on, data has become one of the most sought after and valuable assets. Whether it’s... What is incident response readiness assessment? September 22, 2020 During an ongoing cyberattack, time is of critical essence. Your incident response team must know what it needs to do.... DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying...
Security RecommendationsOur thoughts are with everyone across Europe, and the world, during these distressing times. Here are some general recommendations for...
BLOG FamousSparrow Advanced Persistent Threat Group Rushes to Hotels, Businesses, and Governments. October 11, 2021 Recently, researchers at an internet security company named ESET discovered new cyber-espionage and advanced persistent threat group FamousSparrow. Although the... Groove Ransomware Gang Attracts Affiliates by Attempting New Tactic October 5, 2021 Recently, a new ransomware gang named Groove has sparked the resurgence of cybercrimes to deal a blow to cybersecurity experts.... Data Breach: Attackers Breached Systems of United Nations October 4, 2021 As the shocking news recently emerged that hackers breached the computer networks of the United Nations, it sent shockwaves across... Microsoft Issued a Warning to Its Azure Customers of a Flaw That Might Allow Hackers to Access Data September 23, 2021 On September 8, 2021, Microsoft issued a warning to its Azure customers) cloud computing customers) of a vulnerability. In essence,... Saudi Aramco Acknowledged Data Leak to Attack on Supplier August 24, 2021 In late July 2021, Saudi Aramco acknowledged a data leak of its company from one of its contractors. The oil... What To Look For When Selecting a DLP Solution For Your Business? June 1, 2021 According to IBM, the average data breach cost organization’s an average of $3.86 million per incident. However, organizations are only... Latest Credential Data Breaches and What to Do to Not Get Compromised? May 25, 2021 According to Verizon’s 2021 Data Breach Investigation Report, the median data breach costs companies over $21,000 with some numbering in... REvil Ransomware Gang Warns Stolen Apple Blueprint Leak May 4, 2021 Recently, the REvil ransomware gang has offered Apple to buy back stolen device blueprints to inhibit the leak. The group... Three Lessons the Accellion FTA Hack of Shell Reminded Us April 6, 2021 At the beginning of March, we informed about four actively exploited zero-day vulnerabilities in the Accellion file transfer appliance (FTA).... Zero-days in Accellion file transfer app used for data theft March 4, 2021 Back in December 2020, a software vendor Accellion informed about an actively exploited zero-day vulnerability in its File Transfer Appliance... Common Techniques by Which Malware Makes Itself Persistent January 19, 2021 A hacker wants to keep its malware to stay on the target device, even when the operating system restarts. Do you know... How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... What Is The Average Time To Detect Data Breaches And How To Reduce It? November 3, 2020 On this information superhighway we’re on, data has become one of the most sought after and valuable assets. Whether it’s... What is incident response readiness assessment? September 22, 2020 During an ongoing cyberattack, time is of critical essence. Your incident response team must know what it needs to do.... DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying...
FamousSparrow Advanced Persistent Threat Group Rushes to Hotels, Businesses, and Governments. October 11, 2021 Recently, researchers at an internet security company named ESET discovered new cyber-espionage and advanced persistent threat group FamousSparrow. Although the...
Groove Ransomware Gang Attracts Affiliates by Attempting New Tactic October 5, 2021 Recently, a new ransomware gang named Groove has sparked the resurgence of cybercrimes to deal a blow to cybersecurity experts....
Data Breach: Attackers Breached Systems of United Nations October 4, 2021 As the shocking news recently emerged that hackers breached the computer networks of the United Nations, it sent shockwaves across...
Microsoft Issued a Warning to Its Azure Customers of a Flaw That Might Allow Hackers to Access Data September 23, 2021 On September 8, 2021, Microsoft issued a warning to its Azure customers) cloud computing customers) of a vulnerability. In essence,...
Saudi Aramco Acknowledged Data Leak to Attack on Supplier August 24, 2021 In late July 2021, Saudi Aramco acknowledged a data leak of its company from one of its contractors. The oil...
What To Look For When Selecting a DLP Solution For Your Business? June 1, 2021 According to IBM, the average data breach cost organization’s an average of $3.86 million per incident. However, organizations are only...
Latest Credential Data Breaches and What to Do to Not Get Compromised? May 25, 2021 According to Verizon’s 2021 Data Breach Investigation Report, the median data breach costs companies over $21,000 with some numbering in...
REvil Ransomware Gang Warns Stolen Apple Blueprint Leak May 4, 2021 Recently, the REvil ransomware gang has offered Apple to buy back stolen device blueprints to inhibit the leak. The group...
Three Lessons the Accellion FTA Hack of Shell Reminded Us April 6, 2021 At the beginning of March, we informed about four actively exploited zero-day vulnerabilities in the Accellion file transfer appliance (FTA)....
Zero-days in Accellion file transfer app used for data theft March 4, 2021 Back in December 2020, a software vendor Accellion informed about an actively exploited zero-day vulnerability in its File Transfer Appliance...
Common Techniques by Which Malware Makes Itself Persistent January 19, 2021 A hacker wants to keep its malware to stay on the target device, even when the operating system restarts. Do you know...
How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place....
What Is The Average Time To Detect Data Breaches And How To Reduce It? November 3, 2020 On this information superhighway we’re on, data has become one of the most sought after and valuable assets. Whether it’s...
What is incident response readiness assessment? September 22, 2020 During an ongoing cyberattack, time is of critical essence. Your incident response team must know what it needs to do....
DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying...