Banks On Alert Though Seemingly The Financial Sector Is Not A Specific Focus Of The Ongoing Hacking CampaignThe ongoing hacking campaign has sent shock waves across the U.S. government and the private sector. Meanwhile, as per bank... BLOG How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... NATO Live Stream – Russia’s Strategy in Cyberspace December 14, 2020 On December 2, NATO held a live stream discussing Russia’s strategy in cyberspace. Among the invited speakers were Oscar Jonsson... Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps... What Is MTTD And MTTR And How To Improve It? December 2, 2020 The global cyber threat landscape facing businesses is becoming more daunting every year. SecOps professionals are increasingly turning to information-based... NY Metro InfraGard Emergency Update: Healthcare Cyber Attacks November 25, 2020 About This Event The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation(FBI), and the Department of Health... FBI: Cyber Threat Actors Stole Source Code From US Government Agencies And Private Companies November 25, 2020 The FBI (Federal Bureau of Investigation) has sent out a security warning on October 14, 2020, regarding insecure SonarQube instances.... What Should An Incident Response Plan Contain? November 24, 2020 The threat landscape businesses are facing worldwide has never been as diverse or as harmful. An organization-wide incident response plan... Cryptocurrency Scammers Defaced Donald Trump’s Campaign Website November 12, 2020 For less than 30 minutes hackers took over and defaced Donald Trump’s campaign website. The incident took place at the... Security Information and Event Management Series Part 4: Selecting a SIEM vendor November 9, 2020 In this last part of our series on SIEM, we will try to provide recommendations on selecting a SIEM vendor.... What is Fileless Malware? How Does it Work? November 6, 2020 As the name suggests, fileless malware does not rely on any physical files being transferred and stored on the infected... “There Are Highly Skilled Hackers In Slovakia” – Interview With Ondrej Krehel, LIFARS’ CEO And Founder: Part 4 November 5, 2020 Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise and Ethical Hacking. He actively... What Is The Average Time To Detect Data Breaches And How To Reduce It? November 3, 2020 On this information superhighway we’re on, data has become one of the most sought after and valuable assets. Whether it’s... Security Information and Event Management Series Part 3: Main capabilities of SIEM November 2, 2020 In the first part of this four-part series, we covered the need for SIEM solutions and explained the fundamentals. Then,... “If You Have Zero Incidents, You Probably Lack Monitoring” – Interview With Ondrej Krehel, LIFARS’ CEO And Founder: Part 3 October 30, 2020 Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise and Ethical Hacking. He actively...
Banks On Alert Though Seemingly The Financial Sector Is Not A Specific Focus Of The Ongoing Hacking CampaignThe ongoing hacking campaign has sent shock waves across the U.S. government and the private sector. Meanwhile, as per bank...
BLOG How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... NATO Live Stream – Russia’s Strategy in Cyberspace December 14, 2020 On December 2, NATO held a live stream discussing Russia’s strategy in cyberspace. Among the invited speakers were Oscar Jonsson... Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps... What Is MTTD And MTTR And How To Improve It? December 2, 2020 The global cyber threat landscape facing businesses is becoming more daunting every year. SecOps professionals are increasingly turning to information-based... NY Metro InfraGard Emergency Update: Healthcare Cyber Attacks November 25, 2020 About This Event The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation(FBI), and the Department of Health... FBI: Cyber Threat Actors Stole Source Code From US Government Agencies And Private Companies November 25, 2020 The FBI (Federal Bureau of Investigation) has sent out a security warning on October 14, 2020, regarding insecure SonarQube instances.... What Should An Incident Response Plan Contain? November 24, 2020 The threat landscape businesses are facing worldwide has never been as diverse or as harmful. An organization-wide incident response plan... Cryptocurrency Scammers Defaced Donald Trump’s Campaign Website November 12, 2020 For less than 30 minutes hackers took over and defaced Donald Trump’s campaign website. The incident took place at the... Security Information and Event Management Series Part 4: Selecting a SIEM vendor November 9, 2020 In this last part of our series on SIEM, we will try to provide recommendations on selecting a SIEM vendor.... What is Fileless Malware? How Does it Work? November 6, 2020 As the name suggests, fileless malware does not rely on any physical files being transferred and stored on the infected... “There Are Highly Skilled Hackers In Slovakia” – Interview With Ondrej Krehel, LIFARS’ CEO And Founder: Part 4 November 5, 2020 Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise and Ethical Hacking. He actively... What Is The Average Time To Detect Data Breaches And How To Reduce It? November 3, 2020 On this information superhighway we’re on, data has become one of the most sought after and valuable assets. Whether it’s... Security Information and Event Management Series Part 3: Main capabilities of SIEM November 2, 2020 In the first part of this four-part series, we covered the need for SIEM solutions and explained the fundamentals. Then,... “If You Have Zero Incidents, You Probably Lack Monitoring” – Interview With Ondrej Krehel, LIFARS’ CEO And Founder: Part 3 October 30, 2020 Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise and Ethical Hacking. He actively...
How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place....
NATO Live Stream – Russia’s Strategy in Cyberspace December 14, 2020 On December 2, NATO held a live stream discussing Russia’s strategy in cyberspace. Among the invited speakers were Oscar Jonsson...
Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps...
What Is MTTD And MTTR And How To Improve It? December 2, 2020 The global cyber threat landscape facing businesses is becoming more daunting every year. SecOps professionals are increasingly turning to information-based...
NY Metro InfraGard Emergency Update: Healthcare Cyber Attacks November 25, 2020 About This Event The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation(FBI), and the Department of Health...
FBI: Cyber Threat Actors Stole Source Code From US Government Agencies And Private Companies November 25, 2020 The FBI (Federal Bureau of Investigation) has sent out a security warning on October 14, 2020, regarding insecure SonarQube instances....
What Should An Incident Response Plan Contain? November 24, 2020 The threat landscape businesses are facing worldwide has never been as diverse or as harmful. An organization-wide incident response plan...
Cryptocurrency Scammers Defaced Donald Trump’s Campaign Website November 12, 2020 For less than 30 minutes hackers took over and defaced Donald Trump’s campaign website. The incident took place at the...
Security Information and Event Management Series Part 4: Selecting a SIEM vendor November 9, 2020 In this last part of our series on SIEM, we will try to provide recommendations on selecting a SIEM vendor....
What is Fileless Malware? How Does it Work? November 6, 2020 As the name suggests, fileless malware does not rely on any physical files being transferred and stored on the infected...
“There Are Highly Skilled Hackers In Slovakia” – Interview With Ondrej Krehel, LIFARS’ CEO And Founder: Part 4 November 5, 2020 Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise and Ethical Hacking. He actively...
What Is The Average Time To Detect Data Breaches And How To Reduce It? November 3, 2020 On this information superhighway we’re on, data has become one of the most sought after and valuable assets. Whether it’s...
Security Information and Event Management Series Part 3: Main capabilities of SIEM November 2, 2020 In the first part of this four-part series, we covered the need for SIEM solutions and explained the fundamentals. Then,...
“If You Have Zero Incidents, You Probably Lack Monitoring” – Interview With Ondrej Krehel, LIFARS’ CEO And Founder: Part 3 October 30, 2020 Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise and Ethical Hacking. He actively...