US Military Taking Offensive Action Against Ransomware GroupsThe hacking unit of the US Military – Cyber Command has confirmed that it has taken offensive action against ransomware groups responsible... BLOG State Department Finally Nails Down Plan for New Cyber Bureau December 7, 2021 After constant delays going back over the last two years, the State Department has finally unveiled its plans to establish... Fight Staff Burnout: Cybersecurity Teams Overworked, Understaffed July 19, 2021 Fight Staff Burnout: Cybersecurity Teams Overworked, Understaffed – Those working in the cybersecurity field have made it through this pandemic... PrintNightmare: A Critical Windows Print Spooler Vulnerability July 6, 2021 On June 30th, 2021 the CERT Coordination Center released VulNote for a critical remote code execution vulnerability in the Windows... Root CA Security Best Practices for Ensuring Trusted and Compliant Interactions April 19, 2021 Your certification authority (CA) is a key component in securing your network. It is the entity that issues, manages, and... Importance of PVLAN and Alternative Solutions April 16, 2021 Security officers and network administrators today are sitting between a rock and a hard place. At the same time that... Malware for macOS managed to infect 40,000 of computers March 8, 2021 Cybersecurity research uncovered a new malware for macOS, which managed to infect almost 40,000 computers over the past couple of... Common Mistakes That CISOs Do And How To Avoid Them November 17, 2020 News about data breaches continue to come up, and their pace is only getting faster. It is only becoming easier... How to Plan, Conduct, and Manage Tabletop Exercises? September 30, 2020 A successful cyberattack impacts business operations, reputation, customer trust, and profitability. In the cyberspace, threats are evolving continuously, and tactics,... Has Your Home Network Been Compromised!? September 29, 2020 Have you ever wondered if you would notice that your home network was compromised? Attackers can be stealthy, and they... Iranian Script Kiddies Spread Dharma Ransomware via RDP Ports September 28, 2020 A group of script kiddies tied to Iran have been linked to the recent Dharma campaign. These “newbie” hackers are... Zero-day and N-Day Exploits September 24, 2020 Computer exploit is a software that abuses a security vulnerability. It is written by threat actors to help achieve their goals,... Internal v. External Security Personnel September 23, 2020 Over the years, cyberattacks have grown in sophistication and diversity. The threat landscape is continuously evolving, and there does not... What is incident response readiness assessment? September 22, 2020 During an ongoing cyberattack, time is of critical essence. Your incident response team must know what it needs to do.... VPN Bugs and RDP – Top Exploits Used by Ransomware Gangs September 17, 2020 This year, more cybercrime gangs and ransomware attacks have been witnessed on companies spanning multiple industries. Cybercriminals are always finding... Cybersecurity Awareness for Executives September 14, 2020 In an organizational setup, executives sit at the top of the access level hierarchy. Most likely, your company’s executives will...
US Military Taking Offensive Action Against Ransomware GroupsThe hacking unit of the US Military – Cyber Command has confirmed that it has taken offensive action against ransomware groups responsible...
BLOG State Department Finally Nails Down Plan for New Cyber Bureau December 7, 2021 After constant delays going back over the last two years, the State Department has finally unveiled its plans to establish... Fight Staff Burnout: Cybersecurity Teams Overworked, Understaffed July 19, 2021 Fight Staff Burnout: Cybersecurity Teams Overworked, Understaffed – Those working in the cybersecurity field have made it through this pandemic... PrintNightmare: A Critical Windows Print Spooler Vulnerability July 6, 2021 On June 30th, 2021 the CERT Coordination Center released VulNote for a critical remote code execution vulnerability in the Windows... Root CA Security Best Practices for Ensuring Trusted and Compliant Interactions April 19, 2021 Your certification authority (CA) is a key component in securing your network. It is the entity that issues, manages, and... Importance of PVLAN and Alternative Solutions April 16, 2021 Security officers and network administrators today are sitting between a rock and a hard place. At the same time that... Malware for macOS managed to infect 40,000 of computers March 8, 2021 Cybersecurity research uncovered a new malware for macOS, which managed to infect almost 40,000 computers over the past couple of... Common Mistakes That CISOs Do And How To Avoid Them November 17, 2020 News about data breaches continue to come up, and their pace is only getting faster. It is only becoming easier... How to Plan, Conduct, and Manage Tabletop Exercises? September 30, 2020 A successful cyberattack impacts business operations, reputation, customer trust, and profitability. In the cyberspace, threats are evolving continuously, and tactics,... Has Your Home Network Been Compromised!? September 29, 2020 Have you ever wondered if you would notice that your home network was compromised? Attackers can be stealthy, and they... Iranian Script Kiddies Spread Dharma Ransomware via RDP Ports September 28, 2020 A group of script kiddies tied to Iran have been linked to the recent Dharma campaign. These “newbie” hackers are... Zero-day and N-Day Exploits September 24, 2020 Computer exploit is a software that abuses a security vulnerability. It is written by threat actors to help achieve their goals,... Internal v. External Security Personnel September 23, 2020 Over the years, cyberattacks have grown in sophistication and diversity. The threat landscape is continuously evolving, and there does not... What is incident response readiness assessment? September 22, 2020 During an ongoing cyberattack, time is of critical essence. Your incident response team must know what it needs to do.... VPN Bugs and RDP – Top Exploits Used by Ransomware Gangs September 17, 2020 This year, more cybercrime gangs and ransomware attacks have been witnessed on companies spanning multiple industries. Cybercriminals are always finding... Cybersecurity Awareness for Executives September 14, 2020 In an organizational setup, executives sit at the top of the access level hierarchy. Most likely, your company’s executives will...
State Department Finally Nails Down Plan for New Cyber Bureau December 7, 2021 After constant delays going back over the last two years, the State Department has finally unveiled its plans to establish...
Fight Staff Burnout: Cybersecurity Teams Overworked, Understaffed July 19, 2021 Fight Staff Burnout: Cybersecurity Teams Overworked, Understaffed – Those working in the cybersecurity field have made it through this pandemic...
PrintNightmare: A Critical Windows Print Spooler Vulnerability July 6, 2021 On June 30th, 2021 the CERT Coordination Center released VulNote for a critical remote code execution vulnerability in the Windows...
Root CA Security Best Practices for Ensuring Trusted and Compliant Interactions April 19, 2021 Your certification authority (CA) is a key component in securing your network. It is the entity that issues, manages, and...
Importance of PVLAN and Alternative Solutions April 16, 2021 Security officers and network administrators today are sitting between a rock and a hard place. At the same time that...
Malware for macOS managed to infect 40,000 of computers March 8, 2021 Cybersecurity research uncovered a new malware for macOS, which managed to infect almost 40,000 computers over the past couple of...
Common Mistakes That CISOs Do And How To Avoid Them November 17, 2020 News about data breaches continue to come up, and their pace is only getting faster. It is only becoming easier...
How to Plan, Conduct, and Manage Tabletop Exercises? September 30, 2020 A successful cyberattack impacts business operations, reputation, customer trust, and profitability. In the cyberspace, threats are evolving continuously, and tactics,...
Has Your Home Network Been Compromised!? September 29, 2020 Have you ever wondered if you would notice that your home network was compromised? Attackers can be stealthy, and they...
Iranian Script Kiddies Spread Dharma Ransomware via RDP Ports September 28, 2020 A group of script kiddies tied to Iran have been linked to the recent Dharma campaign. These “newbie” hackers are...
Zero-day and N-Day Exploits September 24, 2020 Computer exploit is a software that abuses a security vulnerability. It is written by threat actors to help achieve their goals,...
Internal v. External Security Personnel September 23, 2020 Over the years, cyberattacks have grown in sophistication and diversity. The threat landscape is continuously evolving, and there does not...
What is incident response readiness assessment? September 22, 2020 During an ongoing cyberattack, time is of critical essence. Your incident response team must know what it needs to do....
VPN Bugs and RDP – Top Exploits Used by Ransomware Gangs September 17, 2020 This year, more cybercrime gangs and ransomware attacks have been witnessed on companies spanning multiple industries. Cybercriminals are always finding...
Cybersecurity Awareness for Executives September 14, 2020 In an organizational setup, executives sit at the top of the access level hierarchy. Most likely, your company’s executives will...