Security RecommendationsOur thoughts are with everyone across Europe, and the world, during these distressing times. Here are some general recommendations for... BLOG How Incident Response Retainer Brings Value to Businesses October 8, 2021 One consequence of a security breach is the leakage of classified information and the disruption of business activities. Significantly, a... Importance Of Documenting Incident Response Process June 3, 2021 A cybersecurity incident can range from the latest ransomware attack to a colleague clicking an email attachment from an unknown... What Is Remote Access Trojan and How To Protect Against It? January 25, 2021 Our systems’ existing capabilities to enable remote access have proven to be a game-changer during the ongoing pandemic. Remote access... How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... What Should An Incident Response Plan Contain? November 24, 2020 The threat landscape businesses are facing worldwide has never been as diverse or as harmful. An organization-wide incident response plan... What is incident response readiness assessment? September 22, 2020 During an ongoing cyberattack, time is of critical essence. Your incident response team must know what it needs to do.... DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying... Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack... Backup Policy vs Backup Plan vs Backup Procedure August 27, 2020 Modern-day enterprises implement a flurry of security measures to protect their IT infrastructure from ever-evolving threats. These security measures... International forums and organizations for CSIRT/CERT teams August 26, 2020 As threats continue to grow in our cyberspace, setting up a dedicated team for incident response has become an undeniable... Advantages of Cyber Incident Retainers August 25, 2020 Being on constant alert for cyber threats to your organization is a must. A cyber-attack can strike your organization at... Twitter Breach: The Aftermath and Lessons Learned August 18, 2020 Many high-profile Twitter accounts including Bill Gates, Barack Obama, Elon Musk, Kim Kardashian were hacked this past July. This attack... A Bootloader Vulnerability Leaves Most Platforms Vulnerable August 17, 2020 Researchers at Eclypsium discovered a vulnerability in an open source bootloader called GRUB, widely used by most Linux distributions... Blackbaud Security Incident August 16, 2020 The cybercrime industry is as vast as it is costly, accounting for trillions of dollars in losses. This constantly growing... OilRig APT’s Innovative Backdoor Creates a Pipeline for Data Exfiltration August 6, 2020 A recent slew of cyberattacks has targeted a telecom company in the Middle East. The malicious group behind the attack...
Security RecommendationsOur thoughts are with everyone across Europe, and the world, during these distressing times. Here are some general recommendations for...
BLOG How Incident Response Retainer Brings Value to Businesses October 8, 2021 One consequence of a security breach is the leakage of classified information and the disruption of business activities. Significantly, a... Importance Of Documenting Incident Response Process June 3, 2021 A cybersecurity incident can range from the latest ransomware attack to a colleague clicking an email attachment from an unknown... What Is Remote Access Trojan and How To Protect Against It? January 25, 2021 Our systems’ existing capabilities to enable remote access have proven to be a game-changer during the ongoing pandemic. Remote access... How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... What Should An Incident Response Plan Contain? November 24, 2020 The threat landscape businesses are facing worldwide has never been as diverse or as harmful. An organization-wide incident response plan... What is incident response readiness assessment? September 22, 2020 During an ongoing cyberattack, time is of critical essence. Your incident response team must know what it needs to do.... DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying... Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack... Backup Policy vs Backup Plan vs Backup Procedure August 27, 2020 Modern-day enterprises implement a flurry of security measures to protect their IT infrastructure from ever-evolving threats. These security measures... International forums and organizations for CSIRT/CERT teams August 26, 2020 As threats continue to grow in our cyberspace, setting up a dedicated team for incident response has become an undeniable... Advantages of Cyber Incident Retainers August 25, 2020 Being on constant alert for cyber threats to your organization is a must. A cyber-attack can strike your organization at... Twitter Breach: The Aftermath and Lessons Learned August 18, 2020 Many high-profile Twitter accounts including Bill Gates, Barack Obama, Elon Musk, Kim Kardashian were hacked this past July. This attack... A Bootloader Vulnerability Leaves Most Platforms Vulnerable August 17, 2020 Researchers at Eclypsium discovered a vulnerability in an open source bootloader called GRUB, widely used by most Linux distributions... Blackbaud Security Incident August 16, 2020 The cybercrime industry is as vast as it is costly, accounting for trillions of dollars in losses. This constantly growing... OilRig APT’s Innovative Backdoor Creates a Pipeline for Data Exfiltration August 6, 2020 A recent slew of cyberattacks has targeted a telecom company in the Middle East. The malicious group behind the attack...
How Incident Response Retainer Brings Value to Businesses October 8, 2021 One consequence of a security breach is the leakage of classified information and the disruption of business activities. Significantly, a...
Importance Of Documenting Incident Response Process June 3, 2021 A cybersecurity incident can range from the latest ransomware attack to a colleague clicking an email attachment from an unknown...
What Is Remote Access Trojan and How To Protect Against It? January 25, 2021 Our systems’ existing capabilities to enable remote access have proven to be a game-changer during the ongoing pandemic. Remote access...
How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place....
What Should An Incident Response Plan Contain? November 24, 2020 The threat landscape businesses are facing worldwide has never been as diverse or as harmful. An organization-wide incident response plan...
What is incident response readiness assessment? September 22, 2020 During an ongoing cyberattack, time is of critical essence. Your incident response team must know what it needs to do....
DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying...
Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack...
Backup Policy vs Backup Plan vs Backup Procedure August 27, 2020 Modern-day enterprises implement a flurry of security measures to protect their IT infrastructure from ever-evolving threats. These security measures...
International forums and organizations for CSIRT/CERT teams August 26, 2020 As threats continue to grow in our cyberspace, setting up a dedicated team for incident response has become an undeniable...
Advantages of Cyber Incident Retainers August 25, 2020 Being on constant alert for cyber threats to your organization is a must. A cyber-attack can strike your organization at...
Twitter Breach: The Aftermath and Lessons Learned August 18, 2020 Many high-profile Twitter accounts including Bill Gates, Barack Obama, Elon Musk, Kim Kardashian were hacked this past July. This attack...
A Bootloader Vulnerability Leaves Most Platforms Vulnerable August 17, 2020 Researchers at Eclypsium discovered a vulnerability in an open source bootloader called GRUB, widely used by most Linux distributions...
Blackbaud Security Incident August 16, 2020 The cybercrime industry is as vast as it is costly, accounting for trillions of dollars in losses. This constantly growing...
OilRig APT’s Innovative Backdoor Creates a Pipeline for Data Exfiltration August 6, 2020 A recent slew of cyberattacks has targeted a telecom company in the Middle East. The malicious group behind the attack...