Importance Of Documenting Incident Response ProcessA cybersecurity incident can range from the latest ransomware attack to a colleague clicking an email attachment from an unknown... BLOG What To Look For When Selecting a DLP Solution For Your Business? June 1, 2021 According to IBM, the average data breach cost organization’s an average of $3.86 million per incident. However, organizations are only... Latest Credential Data Breaches and What to Do to Not Get Compromised? May 25, 2021 According to Verizon’s 2021 Data Breach Investigation Report, the median data breach costs companies over $21,000 with some numbering in... Collecting and Analyzing NetFlow for Incident Response May 7, 2021 As with any type of cybersecurity incident, you can only respond against a threat if you are able to detect... REvil Ransomware Gang Warns Stolen Apple Blueprint Leak May 4, 2021 Recently, the REvil ransomware gang has offered Apple to buy back stolen device blueprints to inhibit the leak. The group... OVH Fire and Disaster Recovery – Lessons Learnt and What You Can Do to Avoid Data Loss April 23, 2021 The hosting community was recently rocked due to a major fire incident at one of hosting provider OVH’s Strasbourg-based data... These Threats Are Still Exploiting Vulnerable Exchange Servers April 14, 2021 The exploitation of vulnerabilities in the Microsoft Exchange Server disclosed in March does not cease despite authorities’ calls for updates.... Purple Fox Malware Now Evolves to Spread Itself Across Windows Machines April 9, 2021 Purple Fox has incorporated a new technique into its arsenal, allowing it to spread itself across windows machines. Essentially, Purple... Three Lessons the Accellion FTA Hack of Shell Reminded Us April 6, 2021 At the beginning of March, we informed about four actively exploited zero-day vulnerabilities in the Accellion file transfer appliance (FTA).... The Underlying Basis for Responsible Disclosure of Vulnerability March 11, 2021 Reporting by security researchers to an organization of the found security vulnerabilities in its hardware or software refers to responsible... Chinese Hackers Compromising Critical Flaws in Microsoft Exchange Servers March 9, 2021 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a red warning for the users of the Microsoft Exchange email... Zero-days in Accellion file transfer app used for data theft March 4, 2021 Back in December 2020, a software vendor Accellion informed about an actively exploited zero-day vulnerability in its File Transfer Appliance... What Is Remote Access Trojan and How To Protect Against It? January 25, 2021 Our systems’ existing capabilities to enable remote access have proven to be a game-changer during the ongoing pandemic. Remote access... Common Techniques by Which Malware Makes Itself Persistent January 19, 2021 A hacker wants to keep its malware to stay on the target device, even when the operating system restarts. Do you know... How to Protect Against TrickBot? January 14, 2021 Trickbot is a malware that started life as a relatively straightforward banking trojan. However, as with most malware, it has...
Importance Of Documenting Incident Response ProcessA cybersecurity incident can range from the latest ransomware attack to a colleague clicking an email attachment from an unknown...
BLOG What To Look For When Selecting a DLP Solution For Your Business? June 1, 2021 According to IBM, the average data breach cost organization’s an average of $3.86 million per incident. However, organizations are only... Latest Credential Data Breaches and What to Do to Not Get Compromised? May 25, 2021 According to Verizon’s 2021 Data Breach Investigation Report, the median data breach costs companies over $21,000 with some numbering in... Collecting and Analyzing NetFlow for Incident Response May 7, 2021 As with any type of cybersecurity incident, you can only respond against a threat if you are able to detect... REvil Ransomware Gang Warns Stolen Apple Blueprint Leak May 4, 2021 Recently, the REvil ransomware gang has offered Apple to buy back stolen device blueprints to inhibit the leak. The group... OVH Fire and Disaster Recovery – Lessons Learnt and What You Can Do to Avoid Data Loss April 23, 2021 The hosting community was recently rocked due to a major fire incident at one of hosting provider OVH’s Strasbourg-based data... These Threats Are Still Exploiting Vulnerable Exchange Servers April 14, 2021 The exploitation of vulnerabilities in the Microsoft Exchange Server disclosed in March does not cease despite authorities’ calls for updates.... Purple Fox Malware Now Evolves to Spread Itself Across Windows Machines April 9, 2021 Purple Fox has incorporated a new technique into its arsenal, allowing it to spread itself across windows machines. Essentially, Purple... Three Lessons the Accellion FTA Hack of Shell Reminded Us April 6, 2021 At the beginning of March, we informed about four actively exploited zero-day vulnerabilities in the Accellion file transfer appliance (FTA).... The Underlying Basis for Responsible Disclosure of Vulnerability March 11, 2021 Reporting by security researchers to an organization of the found security vulnerabilities in its hardware or software refers to responsible... Chinese Hackers Compromising Critical Flaws in Microsoft Exchange Servers March 9, 2021 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a red warning for the users of the Microsoft Exchange email... Zero-days in Accellion file transfer app used for data theft March 4, 2021 Back in December 2020, a software vendor Accellion informed about an actively exploited zero-day vulnerability in its File Transfer Appliance... What Is Remote Access Trojan and How To Protect Against It? January 25, 2021 Our systems’ existing capabilities to enable remote access have proven to be a game-changer during the ongoing pandemic. Remote access... Common Techniques by Which Malware Makes Itself Persistent January 19, 2021 A hacker wants to keep its malware to stay on the target device, even when the operating system restarts. Do you know... How to Protect Against TrickBot? January 14, 2021 Trickbot is a malware that started life as a relatively straightforward banking trojan. However, as with most malware, it has...
What To Look For When Selecting a DLP Solution For Your Business? June 1, 2021 According to IBM, the average data breach cost organization’s an average of $3.86 million per incident. However, organizations are only...
Latest Credential Data Breaches and What to Do to Not Get Compromised? May 25, 2021 According to Verizon’s 2021 Data Breach Investigation Report, the median data breach costs companies over $21,000 with some numbering in...
Collecting and Analyzing NetFlow for Incident Response May 7, 2021 As with any type of cybersecurity incident, you can only respond against a threat if you are able to detect...
REvil Ransomware Gang Warns Stolen Apple Blueprint Leak May 4, 2021 Recently, the REvil ransomware gang has offered Apple to buy back stolen device blueprints to inhibit the leak. The group...
OVH Fire and Disaster Recovery – Lessons Learnt and What You Can Do to Avoid Data Loss April 23, 2021 The hosting community was recently rocked due to a major fire incident at one of hosting provider OVH’s Strasbourg-based data...
These Threats Are Still Exploiting Vulnerable Exchange Servers April 14, 2021 The exploitation of vulnerabilities in the Microsoft Exchange Server disclosed in March does not cease despite authorities’ calls for updates....
Purple Fox Malware Now Evolves to Spread Itself Across Windows Machines April 9, 2021 Purple Fox has incorporated a new technique into its arsenal, allowing it to spread itself across windows machines. Essentially, Purple...
Three Lessons the Accellion FTA Hack of Shell Reminded Us April 6, 2021 At the beginning of March, we informed about four actively exploited zero-day vulnerabilities in the Accellion file transfer appliance (FTA)....
The Underlying Basis for Responsible Disclosure of Vulnerability March 11, 2021 Reporting by security researchers to an organization of the found security vulnerabilities in its hardware or software refers to responsible...
Chinese Hackers Compromising Critical Flaws in Microsoft Exchange Servers March 9, 2021 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a red warning for the users of the Microsoft Exchange email...
Zero-days in Accellion file transfer app used for data theft March 4, 2021 Back in December 2020, a software vendor Accellion informed about an actively exploited zero-day vulnerability in its File Transfer Appliance...
What Is Remote Access Trojan and How To Protect Against It? January 25, 2021 Our systems’ existing capabilities to enable remote access have proven to be a game-changer during the ongoing pandemic. Remote access...
Common Techniques by Which Malware Makes Itself Persistent January 19, 2021 A hacker wants to keep its malware to stay on the target device, even when the operating system restarts. Do you know...
How to Protect Against TrickBot? January 14, 2021 Trickbot is a malware that started life as a relatively straightforward banking trojan. However, as with most malware, it has...