Search Results for: TTPs Blog Post Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps... Blog Post NY Metro InfraGard Emergency Update: Healthcare Cyber Attacks November 25, 2020 About This Event The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation(FBI), and the Department of Health... Blog Post New Cloud Snooper Attack Could Bypasses Firewall Security Measures February 28, 2020 By investigating malware infections of cloud infrastructure servers hosted in the Amazon Web Services (AWS) cloud, researchers found a sophisticated... Blog Post Kaspersky: RDP Brute Force Attack Attacks Rise May 5, 2020 Kaspersky recently warned that hackers have aggressively attacked the Remote Desktop Protocol (RDP) through brute force methods because of the... Blog Post Hackers File Fake Tax Returns To Steal IRS Refunds April 14, 2020 The number of attempted IRS scams tends to increase every year in March and April in the U.S., as legions... Blog Post The Importance of Threat Intelligence June 12, 2020 Threat Intelligence is data collected and analyzed by an organization in order to understand a threat actor’s motives, targets, and attack... Blog Post What is the SIM3 Model? October 9, 2020 An organization’s incident response process must aim for continual improvement. It cannot achieve perfectness in its incident response right from... Blog Post Czech Republic’s Hospital is Hit by Cyberattack Amid Pandemic March 18, 2020 The Brno University Hospital in the city of Brno, the Czech Republic suffered a cyber attack during a COVID-19 outbreak.... Blog Post DEF CON Hacking Conference: “Hunting for Blue Mockingbird Coinminers,” presentation by Ladislav B. August 5, 2020 Hunting for Blue Mockingbird Coinminers. 100,000+ USD damage. 10,000+ USD mined. 1,000+ infected computers. 100+ malicious artifacts. 10+ malwares… Learn... Knowledge Center Case Study – Phishing Test January 29, 2020 Phishing test to ensure implemented security measures remain effective. LIFARS regularly conducts phishing tests, in addition to penetration tests to... Knowledge Center Incident Response Management Retainer July 29, 2019 Without a comprehensive Incident Response Strategy, your exposure to adversaries destroying your data, damaging your brand and dramatically impacting your... Knowledge Center Ransomware Fix and Cyber Vaccines – Malware Analysis of Dridex, BitPaymer and DoppelPaymer campaign November 27, 2019 Threat actors are constantly working towards finding new and complex ways to deploy cyber-attacks. The affiliates behind Dridex (Evil Corp)... Blog Post Emerging Ransomware Groups That Might Be Targeting You Right Now February 19, 2021 Ransomware becomes more and more popular. Emerging Ransomware Groups groups are quickly adopting a double extortion model (Babyk, Egregor, Nefilim). This means... Blog Post Introducing The New Logchecker Tool Developed By LIFARS January 12, 2021 Threat intelligence is one of the most critical weapons we can use in cyber defense. We constantly collect data about... Blog Post What Is The Average Time To Detect Data Breaches And How To Reduce It? November 3, 2020 On this information superhighway we’re on, data has become one of the most sought after and valuable assets. Whether it’s...
Blog Post Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps...
Blog Post NY Metro InfraGard Emergency Update: Healthcare Cyber Attacks November 25, 2020 About This Event The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation(FBI), and the Department of Health...
Blog Post New Cloud Snooper Attack Could Bypasses Firewall Security Measures February 28, 2020 By investigating malware infections of cloud infrastructure servers hosted in the Amazon Web Services (AWS) cloud, researchers found a sophisticated...
Blog Post Kaspersky: RDP Brute Force Attack Attacks Rise May 5, 2020 Kaspersky recently warned that hackers have aggressively attacked the Remote Desktop Protocol (RDP) through brute force methods because of the...
Blog Post Hackers File Fake Tax Returns To Steal IRS Refunds April 14, 2020 The number of attempted IRS scams tends to increase every year in March and April in the U.S., as legions...
Blog Post The Importance of Threat Intelligence June 12, 2020 Threat Intelligence is data collected and analyzed by an organization in order to understand a threat actor’s motives, targets, and attack...
Blog Post What is the SIM3 Model? October 9, 2020 An organization’s incident response process must aim for continual improvement. It cannot achieve perfectness in its incident response right from...
Blog Post Czech Republic’s Hospital is Hit by Cyberattack Amid Pandemic March 18, 2020 The Brno University Hospital in the city of Brno, the Czech Republic suffered a cyber attack during a COVID-19 outbreak....
Blog Post DEF CON Hacking Conference: “Hunting for Blue Mockingbird Coinminers,” presentation by Ladislav B. August 5, 2020 Hunting for Blue Mockingbird Coinminers. 100,000+ USD damage. 10,000+ USD mined. 1,000+ infected computers. 100+ malicious artifacts. 10+ malwares… Learn...
Knowledge Center Case Study – Phishing Test January 29, 2020 Phishing test to ensure implemented security measures remain effective. LIFARS regularly conducts phishing tests, in addition to penetration tests to...
Knowledge Center Incident Response Management Retainer July 29, 2019 Without a comprehensive Incident Response Strategy, your exposure to adversaries destroying your data, damaging your brand and dramatically impacting your...
Knowledge Center Ransomware Fix and Cyber Vaccines – Malware Analysis of Dridex, BitPaymer and DoppelPaymer campaign November 27, 2019 Threat actors are constantly working towards finding new and complex ways to deploy cyber-attacks. The affiliates behind Dridex (Evil Corp)...
Blog Post Emerging Ransomware Groups That Might Be Targeting You Right Now February 19, 2021 Ransomware becomes more and more popular. Emerging Ransomware Groups groups are quickly adopting a double extortion model (Babyk, Egregor, Nefilim). This means...
Blog Post Introducing The New Logchecker Tool Developed By LIFARS January 12, 2021 Threat intelligence is one of the most critical weapons we can use in cyber defense. We constantly collect data about...
Blog Post What Is The Average Time To Detect Data Breaches And How To Reduce It? November 3, 2020 On this information superhighway we’re on, data has become one of the most sought after and valuable assets. Whether it’s...