Shadow IT: The Risks, How it Gets Exploited, Its Mitigation StepsShadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge.... BLOG LIFARS Appoints Gaspare J. Marturano as Chief Marketing Officer January 5, 2021 NEW YORK, NY – January 5, 2021 – LIFARS, a leading cybersecurity firm with specialized services in digital forensics, incident... How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most... Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the... Supply Chain Attacks And Third-Party Risk Management December 23, 2020 In real terms, third-party risk management is about identifying the vulnerabilities of your outside vendors and determining approaches to overcome... Red Teaming Exercise With Ethical Hackers Of LIFARS December 21, 2020 Can your organization withstand a targeted attack? You can find out easily through Red Teaming – a simulation of a... How To Lower The Risks Of Privileged Users Compromise? December 16, 2020 Whenever an attacker compromises an appliance, one of his first steps is to collect all the credentials he can find... Guide To Check For Sunburst Vulnerability in SolarWinds And Whether It Was Exploited December 15, 2020 US CISA released an advisory on current activity in which it is explained that a threat actor is actively exploiting... NATO Live Stream – Russia’s Strategy in Cyberspace December 14, 2020 On December 2, NATO held a live stream discussing Russia’s strategy in cyberspace. Among the invited speakers were Oscar Jonsson... How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous... What Is MTTD And MTTR And How To Improve It? December 2, 2020 The global cyber threat landscape facing businesses is becoming more daunting every year. SecOps professionals are increasingly turning to information-based... What Are The Most Common Myths About ISO 27001? November 27, 2020 ISO 27001:2013 is a class apart when it comes to well-known regulations or standards related to information security. Companies are... FBI: Cyber Threat Actors Stole Source Code From US Government Agencies And Private Companies November 25, 2020 The FBI (Federal Bureau of Investigation) has sent out a security warning on October 14, 2020, regarding insecure SonarQube instances.... Phish Scale – A New Paradigm for Phishing Email Awareness November 19, 2020 Phishing is still an extremely common attack vector directed at individuals and organizations alike. Employees can be targeted specifically in... Cryptocurrency Scammers Defaced Donald Trump’s Campaign Website November 12, 2020 For less than 30 minutes hackers took over and defaced Donald Trump’s campaign website. The incident took place at the... Security Information and Event Management Series Part 4: Selecting a SIEM vendor November 9, 2020 In this last part of our series on SIEM, we will try to provide recommendations on selecting a SIEM vendor....
Shadow IT: The Risks, How it Gets Exploited, Its Mitigation StepsShadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge....
BLOG LIFARS Appoints Gaspare J. Marturano as Chief Marketing Officer January 5, 2021 NEW YORK, NY – January 5, 2021 – LIFARS, a leading cybersecurity firm with specialized services in digital forensics, incident... How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most... Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the... Supply Chain Attacks And Third-Party Risk Management December 23, 2020 In real terms, third-party risk management is about identifying the vulnerabilities of your outside vendors and determining approaches to overcome... Red Teaming Exercise With Ethical Hackers Of LIFARS December 21, 2020 Can your organization withstand a targeted attack? You can find out easily through Red Teaming – a simulation of a... How To Lower The Risks Of Privileged Users Compromise? December 16, 2020 Whenever an attacker compromises an appliance, one of his first steps is to collect all the credentials he can find... Guide To Check For Sunburst Vulnerability in SolarWinds And Whether It Was Exploited December 15, 2020 US CISA released an advisory on current activity in which it is explained that a threat actor is actively exploiting... NATO Live Stream – Russia’s Strategy in Cyberspace December 14, 2020 On December 2, NATO held a live stream discussing Russia’s strategy in cyberspace. Among the invited speakers were Oscar Jonsson... How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous... What Is MTTD And MTTR And How To Improve It? December 2, 2020 The global cyber threat landscape facing businesses is becoming more daunting every year. SecOps professionals are increasingly turning to information-based... What Are The Most Common Myths About ISO 27001? November 27, 2020 ISO 27001:2013 is a class apart when it comes to well-known regulations or standards related to information security. Companies are... FBI: Cyber Threat Actors Stole Source Code From US Government Agencies And Private Companies November 25, 2020 The FBI (Federal Bureau of Investigation) has sent out a security warning on October 14, 2020, regarding insecure SonarQube instances.... Phish Scale – A New Paradigm for Phishing Email Awareness November 19, 2020 Phishing is still an extremely common attack vector directed at individuals and organizations alike. Employees can be targeted specifically in... Cryptocurrency Scammers Defaced Donald Trump’s Campaign Website November 12, 2020 For less than 30 minutes hackers took over and defaced Donald Trump’s campaign website. The incident took place at the... Security Information and Event Management Series Part 4: Selecting a SIEM vendor November 9, 2020 In this last part of our series on SIEM, we will try to provide recommendations on selecting a SIEM vendor....
LIFARS Appoints Gaspare J. Marturano as Chief Marketing Officer January 5, 2021 NEW YORK, NY – January 5, 2021 – LIFARS, a leading cybersecurity firm with specialized services in digital forensics, incident...
How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most...
Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the...
Supply Chain Attacks And Third-Party Risk Management December 23, 2020 In real terms, third-party risk management is about identifying the vulnerabilities of your outside vendors and determining approaches to overcome...
Red Teaming Exercise With Ethical Hackers Of LIFARS December 21, 2020 Can your organization withstand a targeted attack? You can find out easily through Red Teaming – a simulation of a...
How To Lower The Risks Of Privileged Users Compromise? December 16, 2020 Whenever an attacker compromises an appliance, one of his first steps is to collect all the credentials he can find...
Guide To Check For Sunburst Vulnerability in SolarWinds And Whether It Was Exploited December 15, 2020 US CISA released an advisory on current activity in which it is explained that a threat actor is actively exploiting...
NATO Live Stream – Russia’s Strategy in Cyberspace December 14, 2020 On December 2, NATO held a live stream discussing Russia’s strategy in cyberspace. Among the invited speakers were Oscar Jonsson...
How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous...
What Is MTTD And MTTR And How To Improve It? December 2, 2020 The global cyber threat landscape facing businesses is becoming more daunting every year. SecOps professionals are increasingly turning to information-based...
What Are The Most Common Myths About ISO 27001? November 27, 2020 ISO 27001:2013 is a class apart when it comes to well-known regulations or standards related to information security. Companies are...
FBI: Cyber Threat Actors Stole Source Code From US Government Agencies And Private Companies November 25, 2020 The FBI (Federal Bureau of Investigation) has sent out a security warning on October 14, 2020, regarding insecure SonarQube instances....
Phish Scale – A New Paradigm for Phishing Email Awareness November 19, 2020 Phishing is still an extremely common attack vector directed at individuals and organizations alike. Employees can be targeted specifically in...
Cryptocurrency Scammers Defaced Donald Trump’s Campaign Website November 12, 2020 For less than 30 minutes hackers took over and defaced Donald Trump’s campaign website. The incident took place at the...
Security Information and Event Management Series Part 4: Selecting a SIEM vendor November 9, 2020 In this last part of our series on SIEM, we will try to provide recommendations on selecting a SIEM vendor....