New but Odd BlackByte Ransomware Reusing Crypto Keys and Worms into NetworksA cybersecurity firm named Trustwave has recently found a new but odd form of ransomware during its recent incident response... BLOG How Incident Response Retainer Brings Value to Businesses October 8, 2021 One consequence of a security breach is the leakage of classified information and the disruption of business activities. Significantly, a... How Ready Are You for a Ransomware Attack? September 8, 2021 Ransomware seems to be an ever-present threat to our cybersecurity with new high-profile attacks occurring all too often. This leads... Security Challenges Law Firms Facing in 2021 August 26, 2021 Organizations across all fields are facing increased pressure to be able to respond to an ever-increasing array of cyber threats... Watch for Cybersecurity Games at the Tokyo Olympics August 10, 2021 Overwhelmed with watching the world’s best push the limits of humanity and represent the pride of their respective countries, it’s... What’s Your Security Maturity Level? August 4, 2021 Unfortunately, most organizations only learn the value of maturing their security and integrating it into their culture after a costly... Why You’re Lacking Adequate Security Event Logs and How to Fix It July 28, 2021 Information is everything. When a security incident takes place that affects your systems, most security experts agree that they would... The Lorenz Ransomware Gang Demand High Ransoms June 25, 2021 The Lorenz Gang Over the past few months, the Lorenz ransomware threat (the encryptor is believed to be the same... Automation in Incident Response: Identifying and Responding to Potential Security Threats and Incidents June 21, 2021 Over the past few years, we have perceived the increasing use of different devices/tools and the exponential growth of cyberattacks.... Ransomware Gangs Have a New Trick Up their Sleeves: Double-Encrypting Your Data June 16, 2021 Ransomware that double-encrypts your data is an emerging trend among ransomware gangs looking to score big. As we learn everywhere,... Importance Of Documenting Incident Response Process June 3, 2021 A cybersecurity incident can range from the latest ransomware attack to a colleague clicking an email attachment from an unknown... Threat Hunting vs Digital Forensics – What Are They? Do You Need Both? May 24, 2021 Threat hunting and digital forensics are just two of the cogs in a robust and multifaceted security machine. However, there... Incident Types and Taxonomies Used in Cybersec Community May 11, 2021 In the face of this complex and multi-faceted landscape of threat actors and IoCs, security experts can benefit greatly from... Collecting and Analyzing NetFlow for Incident Response May 7, 2021 As with any type of cybersecurity incident, you can only respond against a threat if you are able to detect... CREST Incident Response Maturity Assessment March 16, 2021 CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST’s mission... Risk assessment according to NIST SP 800-30 March 3, 2021 The SP 800-30 Guide for Conducting a Risk Assessment is a guideline by the National Institute of Standards and Technology...
New but Odd BlackByte Ransomware Reusing Crypto Keys and Worms into NetworksA cybersecurity firm named Trustwave has recently found a new but odd form of ransomware during its recent incident response...
BLOG How Incident Response Retainer Brings Value to Businesses October 8, 2021 One consequence of a security breach is the leakage of classified information and the disruption of business activities. Significantly, a... How Ready Are You for a Ransomware Attack? September 8, 2021 Ransomware seems to be an ever-present threat to our cybersecurity with new high-profile attacks occurring all too often. This leads... Security Challenges Law Firms Facing in 2021 August 26, 2021 Organizations across all fields are facing increased pressure to be able to respond to an ever-increasing array of cyber threats... Watch for Cybersecurity Games at the Tokyo Olympics August 10, 2021 Overwhelmed with watching the world’s best push the limits of humanity and represent the pride of their respective countries, it’s... What’s Your Security Maturity Level? August 4, 2021 Unfortunately, most organizations only learn the value of maturing their security and integrating it into their culture after a costly... Why You’re Lacking Adequate Security Event Logs and How to Fix It July 28, 2021 Information is everything. When a security incident takes place that affects your systems, most security experts agree that they would... The Lorenz Ransomware Gang Demand High Ransoms June 25, 2021 The Lorenz Gang Over the past few months, the Lorenz ransomware threat (the encryptor is believed to be the same... Automation in Incident Response: Identifying and Responding to Potential Security Threats and Incidents June 21, 2021 Over the past few years, we have perceived the increasing use of different devices/tools and the exponential growth of cyberattacks.... Ransomware Gangs Have a New Trick Up their Sleeves: Double-Encrypting Your Data June 16, 2021 Ransomware that double-encrypts your data is an emerging trend among ransomware gangs looking to score big. As we learn everywhere,... Importance Of Documenting Incident Response Process June 3, 2021 A cybersecurity incident can range from the latest ransomware attack to a colleague clicking an email attachment from an unknown... Threat Hunting vs Digital Forensics – What Are They? Do You Need Both? May 24, 2021 Threat hunting and digital forensics are just two of the cogs in a robust and multifaceted security machine. However, there... Incident Types and Taxonomies Used in Cybersec Community May 11, 2021 In the face of this complex and multi-faceted landscape of threat actors and IoCs, security experts can benefit greatly from... Collecting and Analyzing NetFlow for Incident Response May 7, 2021 As with any type of cybersecurity incident, you can only respond against a threat if you are able to detect... CREST Incident Response Maturity Assessment March 16, 2021 CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST’s mission... Risk assessment according to NIST SP 800-30 March 3, 2021 The SP 800-30 Guide for Conducting a Risk Assessment is a guideline by the National Institute of Standards and Technology...
How Incident Response Retainer Brings Value to Businesses October 8, 2021 One consequence of a security breach is the leakage of classified information and the disruption of business activities. Significantly, a...
How Ready Are You for a Ransomware Attack? September 8, 2021 Ransomware seems to be an ever-present threat to our cybersecurity with new high-profile attacks occurring all too often. This leads...
Security Challenges Law Firms Facing in 2021 August 26, 2021 Organizations across all fields are facing increased pressure to be able to respond to an ever-increasing array of cyber threats...
Watch for Cybersecurity Games at the Tokyo Olympics August 10, 2021 Overwhelmed with watching the world’s best push the limits of humanity and represent the pride of their respective countries, it’s...
What’s Your Security Maturity Level? August 4, 2021 Unfortunately, most organizations only learn the value of maturing their security and integrating it into their culture after a costly...
Why You’re Lacking Adequate Security Event Logs and How to Fix It July 28, 2021 Information is everything. When a security incident takes place that affects your systems, most security experts agree that they would...
The Lorenz Ransomware Gang Demand High Ransoms June 25, 2021 The Lorenz Gang Over the past few months, the Lorenz ransomware threat (the encryptor is believed to be the same...
Automation in Incident Response: Identifying and Responding to Potential Security Threats and Incidents June 21, 2021 Over the past few years, we have perceived the increasing use of different devices/tools and the exponential growth of cyberattacks....
Ransomware Gangs Have a New Trick Up their Sleeves: Double-Encrypting Your Data June 16, 2021 Ransomware that double-encrypts your data is an emerging trend among ransomware gangs looking to score big. As we learn everywhere,...
Importance Of Documenting Incident Response Process June 3, 2021 A cybersecurity incident can range from the latest ransomware attack to a colleague clicking an email attachment from an unknown...
Threat Hunting vs Digital Forensics – What Are They? Do You Need Both? May 24, 2021 Threat hunting and digital forensics are just two of the cogs in a robust and multifaceted security machine. However, there...
Incident Types and Taxonomies Used in Cybersec Community May 11, 2021 In the face of this complex and multi-faceted landscape of threat actors and IoCs, security experts can benefit greatly from...
Collecting and Analyzing NetFlow for Incident Response May 7, 2021 As with any type of cybersecurity incident, you can only respond against a threat if you are able to detect...
CREST Incident Response Maturity Assessment March 16, 2021 CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST’s mission...
Risk assessment according to NIST SP 800-30 March 3, 2021 The SP 800-30 Guide for Conducting a Risk Assessment is a guideline by the National Institute of Standards and Technology...