Drovorub: The Latest Russian Cyber WeaponThe NSA and the FBI released a joint statement about a previously undisclosed malware used by the Russian military intelligence unit –... BLOG DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying... What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an... Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack... Benefits of end-to-end encryption & client-side encryption August 31, 2020 End-to-end and client-side encryption are controversial topics for legitimate reasons. While it makes digital forensics more difficult, it also brings many... FBI Warns of Windows 7 end-of-life Security Risk August 28, 2020 Earlier this month, the FBI sent out a warning to U.S. private sector partners about the Windows 7 operating system.... Backup Policy vs Backup Plan vs Backup Procedure August 27, 2020 Modern-day enterprises implement a flurry of security measures to protect their IT infrastructure from ever-evolving threats. These security measures... €2.9 Million Issued in Fines in Q2 2020 Under GDPR August 27, 2020 The COVID-19 pandemic brought on many problems for organizations from all industries across the world. Organizations that were able to... International forums and organizations for CSIRT/CERT teams August 26, 2020 As threats continue to grow in our cyberspace, setting up a dedicated team for incident response has become an undeniable... Advantages of Cyber Incident Retainers August 25, 2020 Being on constant alert for cyber threats to your organization is a must. A cyber-attack can strike your organization at... The Overlooked Cyber Risk of Employees Returning to the Offices from Quarantine August 24, 2020 The COVID-19 pandemic has created many challenges for businesses. Employees have been tasked with working remotely from home, in addition... 5 ways To Improve Security Awareness Training August 20, 2020 The weakest link of the cybersecurity chain is the user. Therefore, expensive antivirus and software may not always hold up... The Top Six Cyber Security Threats for 2020 August 19, 2020 The estimated cost of cyber crimes across the globe will reach up to $6 trillion a year by 2021, according... What is Deepfake Phishing and How to Detect It? August 18, 2020 What are deepfakes? Deepfake is quite a recent phenomenon. The term is used to describe the result of artificial intelligence... Lack of Visibility into Key Security Controls is a Big Problem for Cybersecurity Teams August 7, 2020 The 2020 State of Enterprise Security Posture Report published findings that are concerning for the overall cybersecurity of organizations. It...
Drovorub: The Latest Russian Cyber WeaponThe NSA and the FBI released a joint statement about a previously undisclosed malware used by the Russian military intelligence unit –...
BLOG DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying... What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an... Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack... Benefits of end-to-end encryption & client-side encryption August 31, 2020 End-to-end and client-side encryption are controversial topics for legitimate reasons. While it makes digital forensics more difficult, it also brings many... FBI Warns of Windows 7 end-of-life Security Risk August 28, 2020 Earlier this month, the FBI sent out a warning to U.S. private sector partners about the Windows 7 operating system.... Backup Policy vs Backup Plan vs Backup Procedure August 27, 2020 Modern-day enterprises implement a flurry of security measures to protect their IT infrastructure from ever-evolving threats. These security measures... €2.9 Million Issued in Fines in Q2 2020 Under GDPR August 27, 2020 The COVID-19 pandemic brought on many problems for organizations from all industries across the world. Organizations that were able to... International forums and organizations for CSIRT/CERT teams August 26, 2020 As threats continue to grow in our cyberspace, setting up a dedicated team for incident response has become an undeniable... Advantages of Cyber Incident Retainers August 25, 2020 Being on constant alert for cyber threats to your organization is a must. A cyber-attack can strike your organization at... The Overlooked Cyber Risk of Employees Returning to the Offices from Quarantine August 24, 2020 The COVID-19 pandemic has created many challenges for businesses. Employees have been tasked with working remotely from home, in addition... 5 ways To Improve Security Awareness Training August 20, 2020 The weakest link of the cybersecurity chain is the user. Therefore, expensive antivirus and software may not always hold up... The Top Six Cyber Security Threats for 2020 August 19, 2020 The estimated cost of cyber crimes across the globe will reach up to $6 trillion a year by 2021, according... What is Deepfake Phishing and How to Detect It? August 18, 2020 What are deepfakes? Deepfake is quite a recent phenomenon. The term is used to describe the result of artificial intelligence... Lack of Visibility into Key Security Controls is a Big Problem for Cybersecurity Teams August 7, 2020 The 2020 State of Enterprise Security Posture Report published findings that are concerning for the overall cybersecurity of organizations. It...
DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying...
What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an...
Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack...
Benefits of end-to-end encryption & client-side encryption August 31, 2020 End-to-end and client-side encryption are controversial topics for legitimate reasons. While it makes digital forensics more difficult, it also brings many...
FBI Warns of Windows 7 end-of-life Security Risk August 28, 2020 Earlier this month, the FBI sent out a warning to U.S. private sector partners about the Windows 7 operating system....
Backup Policy vs Backup Plan vs Backup Procedure August 27, 2020 Modern-day enterprises implement a flurry of security measures to protect their IT infrastructure from ever-evolving threats. These security measures...
€2.9 Million Issued in Fines in Q2 2020 Under GDPR August 27, 2020 The COVID-19 pandemic brought on many problems for organizations from all industries across the world. Organizations that were able to...
International forums and organizations for CSIRT/CERT teams August 26, 2020 As threats continue to grow in our cyberspace, setting up a dedicated team for incident response has become an undeniable...
Advantages of Cyber Incident Retainers August 25, 2020 Being on constant alert for cyber threats to your organization is a must. A cyber-attack can strike your organization at...
The Overlooked Cyber Risk of Employees Returning to the Offices from Quarantine August 24, 2020 The COVID-19 pandemic has created many challenges for businesses. Employees have been tasked with working remotely from home, in addition...
5 ways To Improve Security Awareness Training August 20, 2020 The weakest link of the cybersecurity chain is the user. Therefore, expensive antivirus and software may not always hold up...
The Top Six Cyber Security Threats for 2020 August 19, 2020 The estimated cost of cyber crimes across the globe will reach up to $6 trillion a year by 2021, according...
What is Deepfake Phishing and How to Detect It? August 18, 2020 What are deepfakes? Deepfake is quite a recent phenomenon. The term is used to describe the result of artificial intelligence...
Lack of Visibility into Key Security Controls is a Big Problem for Cybersecurity Teams August 7, 2020 The 2020 State of Enterprise Security Posture Report published findings that are concerning for the overall cybersecurity of organizations. It...