Check Your Company’s Confluence Server ASAP!Initially when the Confluence Server Vulnerability was discovered, it was thought to be an internal threat only. A simple search... BLOG 2021 Has The Emergence Of Babuk Locker Ransomware January 11, 2021 Babuk Locker is a new form of ransomware that just emerged in 2021. This version of ransomware is like other... How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most... Attacks Are Getting Pricier: Average Ransomware Payment Ramped Up By 60% January 4, 2021 Ransomware is a severe and recurring cyberattack nowadays. It happens when a cyber threat actor locks a company’s data with... Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the... CISA Urged Admins To Apply The Security Update To Patch Vulnerability In OpenSSL December 29, 2020 On December 8, 2020, OpenSSL issued a security update for a high severity DoS vulnerability that affects the open-source project.... How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username... Compensatory Security Controls: The Alternative Solution December 18, 2020 In the modern-day threat landscape, organizations cannot sit back and wait for an attack to happen. They need to implement... How To Lower The Risks Of Privileged Users Compromise? December 16, 2020 Whenever an attacker compromises an appliance, one of his first steps is to collect all the credentials he can find... Egregor Ransomware Attacks Creating Uncertainty in Cyberspace December 10, 2020 A relatively newer cyber assault called egregor ransomware attack is making its name in the cyber world fast. It’s becoming... Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps... Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls... Maze Ransomware: An Infamous Cybercriminal Group Announces to Shut Down its Operations December 1, 2020 In a press release, a notorious cybercriminal group named Maze proclaims to shut down its operations. Ever since the announcement... Corrective Security Controls November 30, 2020 Organizations implement a comprehensive set of security controls to minimize their risks. For security professionals, it is necessary to understand... Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you...
Check Your Company’s Confluence Server ASAP!Initially when the Confluence Server Vulnerability was discovered, it was thought to be an internal threat only. A simple search...
BLOG 2021 Has The Emergence Of Babuk Locker Ransomware January 11, 2021 Babuk Locker is a new form of ransomware that just emerged in 2021. This version of ransomware is like other... How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most... Attacks Are Getting Pricier: Average Ransomware Payment Ramped Up By 60% January 4, 2021 Ransomware is a severe and recurring cyberattack nowadays. It happens when a cyber threat actor locks a company’s data with... Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the... CISA Urged Admins To Apply The Security Update To Patch Vulnerability In OpenSSL December 29, 2020 On December 8, 2020, OpenSSL issued a security update for a high severity DoS vulnerability that affects the open-source project.... How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username... Compensatory Security Controls: The Alternative Solution December 18, 2020 In the modern-day threat landscape, organizations cannot sit back and wait for an attack to happen. They need to implement... How To Lower The Risks Of Privileged Users Compromise? December 16, 2020 Whenever an attacker compromises an appliance, one of his first steps is to collect all the credentials he can find... Egregor Ransomware Attacks Creating Uncertainty in Cyberspace December 10, 2020 A relatively newer cyber assault called egregor ransomware attack is making its name in the cyber world fast. It’s becoming... Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps... Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls... Maze Ransomware: An Infamous Cybercriminal Group Announces to Shut Down its Operations December 1, 2020 In a press release, a notorious cybercriminal group named Maze proclaims to shut down its operations. Ever since the announcement... Corrective Security Controls November 30, 2020 Organizations implement a comprehensive set of security controls to minimize their risks. For security professionals, it is necessary to understand... Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you...
2021 Has The Emergence Of Babuk Locker Ransomware January 11, 2021 Babuk Locker is a new form of ransomware that just emerged in 2021. This version of ransomware is like other...
How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most...
Attacks Are Getting Pricier: Average Ransomware Payment Ramped Up By 60% January 4, 2021 Ransomware is a severe and recurring cyberattack nowadays. It happens when a cyber threat actor locks a company’s data with...
Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the...
CISA Urged Admins To Apply The Security Update To Patch Vulnerability In OpenSSL December 29, 2020 On December 8, 2020, OpenSSL issued a security update for a high severity DoS vulnerability that affects the open-source project....
How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place....
Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username...
Compensatory Security Controls: The Alternative Solution December 18, 2020 In the modern-day threat landscape, organizations cannot sit back and wait for an attack to happen. They need to implement...
How To Lower The Risks Of Privileged Users Compromise? December 16, 2020 Whenever an attacker compromises an appliance, one of his first steps is to collect all the credentials he can find...
Egregor Ransomware Attacks Creating Uncertainty in Cyberspace December 10, 2020 A relatively newer cyber assault called egregor ransomware attack is making its name in the cyber world fast. It’s becoming...
Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps...
Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls...
Maze Ransomware: An Infamous Cybercriminal Group Announces to Shut Down its Operations December 1, 2020 In a press release, a notorious cybercriminal group named Maze proclaims to shut down its operations. Ever since the announcement...
Corrective Security Controls November 30, 2020 Organizations implement a comprehensive set of security controls to minimize their risks. For security professionals, it is necessary to understand...
Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you...