Encrypting your files is not enough for ransomware operators anymoreRansomware attacks have become a trend in the malware world, and they are a goldmine for their operators. The usual... BLOG Major Vulnerabilities in Android June 29, 2020 Security researchers have found a major vulnerability in Android, which lets malware imitate legitimate apps to steal app passwords, and... The Basics of Network Forensics June 23, 2020 The process of capture, recording, and analysis of network packets to determine the source of network security attacks is known... What is A Buffer Overflow Attack June 19, 2020 A common software coding mistake that an attacker could exploit to gain access and are responsible for many vulnerabilities in... Impact of Data Breaches on Businesses Reputation and How to Minimize Risk June 3, 2020 To avoid a major loss post a data breach, every organization must have an incident response plan and engage in... Cyber Security Webinar On-Demand: Workforce Diaspora – Adapting to Secure the Remote Workforce June 1, 2020 Free cyber security webinar on demand powered by LIFARS and Darktrace: “Workforce Diaspora – Adapting to Secure the Remote Workforce”... Fake Windows update (Hidden Ransomware) May 31, 2020 Ransomware has developed into a ‘criminal malware of choice’ in recent times, especially when it comes to hitting local government... Can Mobile Devices get Malware? May 28, 2020 Mobile malware is malicious software which targets mobile devices, such as smartphones and tablets, with an aim of accessing private... What are Indicators of Compromise (IoCs) Used For? May 27, 2020 Many times when a cyber breach occurs, organizations do not have any evidence. Similar to a Crime that occurs in... Ransomware as a service (RaaS): What is it and How Does It Work? May 23, 2020 Ransomware, dating back to 1989, is a variety of malware that attempts to extort money from a computer user by... Mobile Devices Security May 22, 2020 With the existing threats to computers, mobile devices are more prone to cyber threats due to the latest technology which... Man in the middle attacks in Mobile Devices May 18, 2020 Mobile security has always been a weak link for cyber attacks in organizations since mobile devices have been introduced to... Advanced Persistent Threats: Are They Dangerous? May 16, 2020 An advanced persistent threat, commonly referred to as an APT, is a type of a cyber attack where an attacker... Mobile Threats in Today’s Landscape May 15, 2020 The Cyber Security Industry has seen more sophisticated attacks emerging after having their hands full with digital security with the... GAP in the Cyber Industry May 14, 2020 With increased cyber security risks and attacks, the cyber security gap has been in discussion lately. It is a rising ...
Encrypting your files is not enough for ransomware operators anymoreRansomware attacks have become a trend in the malware world, and they are a goldmine for their operators. The usual...
BLOG Major Vulnerabilities in Android June 29, 2020 Security researchers have found a major vulnerability in Android, which lets malware imitate legitimate apps to steal app passwords, and... The Basics of Network Forensics June 23, 2020 The process of capture, recording, and analysis of network packets to determine the source of network security attacks is known... What is A Buffer Overflow Attack June 19, 2020 A common software coding mistake that an attacker could exploit to gain access and are responsible for many vulnerabilities in... Impact of Data Breaches on Businesses Reputation and How to Minimize Risk June 3, 2020 To avoid a major loss post a data breach, every organization must have an incident response plan and engage in... Cyber Security Webinar On-Demand: Workforce Diaspora – Adapting to Secure the Remote Workforce June 1, 2020 Free cyber security webinar on demand powered by LIFARS and Darktrace: “Workforce Diaspora – Adapting to Secure the Remote Workforce”... Fake Windows update (Hidden Ransomware) May 31, 2020 Ransomware has developed into a ‘criminal malware of choice’ in recent times, especially when it comes to hitting local government... Can Mobile Devices get Malware? May 28, 2020 Mobile malware is malicious software which targets mobile devices, such as smartphones and tablets, with an aim of accessing private... What are Indicators of Compromise (IoCs) Used For? May 27, 2020 Many times when a cyber breach occurs, organizations do not have any evidence. Similar to a Crime that occurs in... Ransomware as a service (RaaS): What is it and How Does It Work? May 23, 2020 Ransomware, dating back to 1989, is a variety of malware that attempts to extort money from a computer user by... Mobile Devices Security May 22, 2020 With the existing threats to computers, mobile devices are more prone to cyber threats due to the latest technology which... Man in the middle attacks in Mobile Devices May 18, 2020 Mobile security has always been a weak link for cyber attacks in organizations since mobile devices have been introduced to... Advanced Persistent Threats: Are They Dangerous? May 16, 2020 An advanced persistent threat, commonly referred to as an APT, is a type of a cyber attack where an attacker... Mobile Threats in Today’s Landscape May 15, 2020 The Cyber Security Industry has seen more sophisticated attacks emerging after having their hands full with digital security with the... GAP in the Cyber Industry May 14, 2020 With increased cyber security risks and attacks, the cyber security gap has been in discussion lately. It is a rising ...
Major Vulnerabilities in Android June 29, 2020 Security researchers have found a major vulnerability in Android, which lets malware imitate legitimate apps to steal app passwords, and...
The Basics of Network Forensics June 23, 2020 The process of capture, recording, and analysis of network packets to determine the source of network security attacks is known...
What is A Buffer Overflow Attack June 19, 2020 A common software coding mistake that an attacker could exploit to gain access and are responsible for many vulnerabilities in...
Impact of Data Breaches on Businesses Reputation and How to Minimize Risk June 3, 2020 To avoid a major loss post a data breach, every organization must have an incident response plan and engage in...
Cyber Security Webinar On-Demand: Workforce Diaspora – Adapting to Secure the Remote Workforce June 1, 2020 Free cyber security webinar on demand powered by LIFARS and Darktrace: “Workforce Diaspora – Adapting to Secure the Remote Workforce”...
Fake Windows update (Hidden Ransomware) May 31, 2020 Ransomware has developed into a ‘criminal malware of choice’ in recent times, especially when it comes to hitting local government...
Can Mobile Devices get Malware? May 28, 2020 Mobile malware is malicious software which targets mobile devices, such as smartphones and tablets, with an aim of accessing private...
What are Indicators of Compromise (IoCs) Used For? May 27, 2020 Many times when a cyber breach occurs, organizations do not have any evidence. Similar to a Crime that occurs in...
Ransomware as a service (RaaS): What is it and How Does It Work? May 23, 2020 Ransomware, dating back to 1989, is a variety of malware that attempts to extort money from a computer user by...
Mobile Devices Security May 22, 2020 With the existing threats to computers, mobile devices are more prone to cyber threats due to the latest technology which...
Man in the middle attacks in Mobile Devices May 18, 2020 Mobile security has always been a weak link for cyber attacks in organizations since mobile devices have been introduced to...
Advanced Persistent Threats: Are They Dangerous? May 16, 2020 An advanced persistent threat, commonly referred to as an APT, is a type of a cyber attack where an attacker...
Mobile Threats in Today’s Landscape May 15, 2020 The Cyber Security Industry has seen more sophisticated attacks emerging after having their hands full with digital security with the...
GAP in the Cyber Industry May 14, 2020 With increased cyber security risks and attacks, the cyber security gap has been in discussion lately. It is a rising ...