InkySquid State Actor Takes Advantage of Known IE (Internet Explorer) BugsCybersecurity researchers have recently claimed that they observed malicious code on a South Korean newspaper website named Daily NK. Shockingly,... BLOG Increasing Visibility to Find Signs of Reconnaissance and Lateral Movement July 23, 2021 Establishing an ATP (advanced persistent threat) has long been the goal of cyberattacks. By remaining undetected in the target environment,... Collecting and Analyzing NetFlow for Incident Response May 7, 2021 As with any type of cybersecurity incident, you can only respond against a threat if you are able to detect... Threat Hunting on Dark Web April 12, 2021 Implementing a good threat hunting strategy helps a company to identify emerging threats and protect against targeted attacks. Monitoring alone... Top Cyberattacks of 2020 that Made People Take Cybersecurity Seriously February 1, 2021 Do you know cybercrime may become the third-largest economy by 2021? Sadly, it is the case since the damages causing... The UEFI/BIOS Firmware is Vulnerable to the New TrickBot Version December 17, 2020 Recently, two security firms named Advanced Intelligence and Eclypsium dropped a bombshell in a joint report. They found that the... Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps... What Is Threat Modeling in Cybersecurity? A Brief Introduction October 13, 2020 A growing number of enterprises are using threat modeling to improve their applications’ security architecture. But what is threat modeling... Drovorub: The Latest Russian Cyber Weapon September 9, 2020 The NSA and the FBI released a joint statement about a previously undisclosed malware used by the Russian military intelligence unit –... Understanding The Common Vulnerability Scoring System August 10, 2020 A vulnerability is a weakness in hardware, software, personnel, or procedures. However, not all vulnerabilities are equal. Some vulnerabilities have... Vulnerability Scanning, Penetration Testing, Red Teaming – Know the Difference July 28, 2020 Vulnerability scanning, penetration testing, and red teaming all belong to the branch of proactive security. Experts performing these offensive security... Analysis of TrickBot Malware – the most prolific COVID-19 themed malware July 23, 2020 In this article you will learn about: Distribution techniques of TrickBot malware Different modules and tasks of the TrickBot payload ... A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... The Importance of Threat Hunting July 17, 2020 Organizations should constantly be on alert for possible cyber threats lurking around, given the rapidly evolving tactics, weapons, and technologies... A Flaw in VMware Cloud June 17, 2020 Penetration testers at Citadel discovered a new vulnerability in VMware’s Cloud Directory platform on April 9. They discovered during auditing... Impact of Data Breaches on Businesses Reputation and How to Minimize Risk June 3, 2020 To avoid a major loss post a data breach, every organization must have an incident response plan and engage in...
InkySquid State Actor Takes Advantage of Known IE (Internet Explorer) BugsCybersecurity researchers have recently claimed that they observed malicious code on a South Korean newspaper website named Daily NK. Shockingly,...
BLOG Increasing Visibility to Find Signs of Reconnaissance and Lateral Movement July 23, 2021 Establishing an ATP (advanced persistent threat) has long been the goal of cyberattacks. By remaining undetected in the target environment,... Collecting and Analyzing NetFlow for Incident Response May 7, 2021 As with any type of cybersecurity incident, you can only respond against a threat if you are able to detect... Threat Hunting on Dark Web April 12, 2021 Implementing a good threat hunting strategy helps a company to identify emerging threats and protect against targeted attacks. Monitoring alone... Top Cyberattacks of 2020 that Made People Take Cybersecurity Seriously February 1, 2021 Do you know cybercrime may become the third-largest economy by 2021? Sadly, it is the case since the damages causing... The UEFI/BIOS Firmware is Vulnerable to the New TrickBot Version December 17, 2020 Recently, two security firms named Advanced Intelligence and Eclypsium dropped a bombshell in a joint report. They found that the... Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps... What Is Threat Modeling in Cybersecurity? A Brief Introduction October 13, 2020 A growing number of enterprises are using threat modeling to improve their applications’ security architecture. But what is threat modeling... Drovorub: The Latest Russian Cyber Weapon September 9, 2020 The NSA and the FBI released a joint statement about a previously undisclosed malware used by the Russian military intelligence unit –... Understanding The Common Vulnerability Scoring System August 10, 2020 A vulnerability is a weakness in hardware, software, personnel, or procedures. However, not all vulnerabilities are equal. Some vulnerabilities have... Vulnerability Scanning, Penetration Testing, Red Teaming – Know the Difference July 28, 2020 Vulnerability scanning, penetration testing, and red teaming all belong to the branch of proactive security. Experts performing these offensive security... Analysis of TrickBot Malware – the most prolific COVID-19 themed malware July 23, 2020 In this article you will learn about: Distribution techniques of TrickBot malware Different modules and tasks of the TrickBot payload ... A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... The Importance of Threat Hunting July 17, 2020 Organizations should constantly be on alert for possible cyber threats lurking around, given the rapidly evolving tactics, weapons, and technologies... A Flaw in VMware Cloud June 17, 2020 Penetration testers at Citadel discovered a new vulnerability in VMware’s Cloud Directory platform on April 9. They discovered during auditing... Impact of Data Breaches on Businesses Reputation and How to Minimize Risk June 3, 2020 To avoid a major loss post a data breach, every organization must have an incident response plan and engage in...
Increasing Visibility to Find Signs of Reconnaissance and Lateral Movement July 23, 2021 Establishing an ATP (advanced persistent threat) has long been the goal of cyberattacks. By remaining undetected in the target environment,...
Collecting and Analyzing NetFlow for Incident Response May 7, 2021 As with any type of cybersecurity incident, you can only respond against a threat if you are able to detect...
Threat Hunting on Dark Web April 12, 2021 Implementing a good threat hunting strategy helps a company to identify emerging threats and protect against targeted attacks. Monitoring alone...
Top Cyberattacks of 2020 that Made People Take Cybersecurity Seriously February 1, 2021 Do you know cybercrime may become the third-largest economy by 2021? Sadly, it is the case since the damages causing...
The UEFI/BIOS Firmware is Vulnerable to the New TrickBot Version December 17, 2020 Recently, two security firms named Advanced Intelligence and Eclypsium dropped a bombshell in a joint report. They found that the...
Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps...
What Is Threat Modeling in Cybersecurity? A Brief Introduction October 13, 2020 A growing number of enterprises are using threat modeling to improve their applications’ security architecture. But what is threat modeling...
Drovorub: The Latest Russian Cyber Weapon September 9, 2020 The NSA and the FBI released a joint statement about a previously undisclosed malware used by the Russian military intelligence unit –...
Understanding The Common Vulnerability Scoring System August 10, 2020 A vulnerability is a weakness in hardware, software, personnel, or procedures. However, not all vulnerabilities are equal. Some vulnerabilities have...
Vulnerability Scanning, Penetration Testing, Red Teaming – Know the Difference July 28, 2020 Vulnerability scanning, penetration testing, and red teaming all belong to the branch of proactive security. Experts performing these offensive security...
Analysis of TrickBot Malware – the most prolific COVID-19 themed malware July 23, 2020 In this article you will learn about: Distribution techniques of TrickBot malware Different modules and tasks of the TrickBot payload ...
A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every...
The Importance of Threat Hunting July 17, 2020 Organizations should constantly be on alert for possible cyber threats lurking around, given the rapidly evolving tactics, weapons, and technologies...
A Flaw in VMware Cloud June 17, 2020 Penetration testers at Citadel discovered a new vulnerability in VMware’s Cloud Directory platform on April 9. They discovered during auditing...
Impact of Data Breaches on Businesses Reputation and How to Minimize Risk June 3, 2020 To avoid a major loss post a data breach, every organization must have an incident response plan and engage in...