SysJoker – A New Multi-Platform Backdoor Malware Targeting Microsoft, Mac, and Linux SystemsA new, multi-platform backdoor malware was discovered in December 2021, targeting Windows, Linux, and Mac systems. The backdoor has been... BLOG Attackers Exploiting Companies That Use Advanced VPNs November 19, 2021 Virtual Private Networks (VPNs) have long been an essential part in the operation of modern businesses. They have recently become... Check Your Company’s Confluence Server ASAP! September 7, 2021 Initially when the Confluence Server Vulnerability was discovered, it was thought to be an internal threat only. A simple search... Schneider Electric PLCs Vulnerability Takes into Consideration Undetectable Remote Takeover August 9, 2021 Researchers at a security platform named Armis have recently discovered a critical Schneider Electric PLCs vulnerability. It poses a threat... PrintNightmare: A Critical Windows Print Spooler Vulnerability July 6, 2021 On June 30th, 2021 the CERT Coordination Center released VulNote for a critical remote code execution vulnerability in the Windows... Risk Assessment: NIST 800-30 vs ISO/IEC 27005 March 19, 2021 Security risk assessment is one of the key phases of the risk management process. Above all, it refers to the... Malware for macOS managed to infect 40,000 of computers March 8, 2021 Cybersecurity research uncovered a new malware for macOS, which managed to infect almost 40,000 computers over the past couple of... Latest: North Korea-backed campaign is targeting cybersecurity researchers January 28, 2021 Google’s Threat Analysis Group (TAG) has recently published a report detailing how a campaign backed by the government of North... What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT... Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge.... CISA Urged Admins To Apply The Security Update To Patch Vulnerability In OpenSSL December 29, 2020 On December 8, 2020, OpenSSL issued a security update for a high severity DoS vulnerability that affects the open-source project.... How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... Supply Chain Attacks And Third-Party Risk Management December 23, 2020 In real terms, third-party risk management is about identifying the vulnerabilities of your outside vendors and determining approaches to overcome... Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you... Common Mistakes That CISOs Do And How To Avoid Them November 17, 2020 News about data breaches continue to come up, and their pace is only getting faster. It is only becoming easier... What is black box Pentesting? October 28, 2020 Organizations implement a broad range of security measures to maintain a sound security posture. These security measures can be either...
SysJoker – A New Multi-Platform Backdoor Malware Targeting Microsoft, Mac, and Linux SystemsA new, multi-platform backdoor malware was discovered in December 2021, targeting Windows, Linux, and Mac systems. The backdoor has been...
BLOG Attackers Exploiting Companies That Use Advanced VPNs November 19, 2021 Virtual Private Networks (VPNs) have long been an essential part in the operation of modern businesses. They have recently become... Check Your Company’s Confluence Server ASAP! September 7, 2021 Initially when the Confluence Server Vulnerability was discovered, it was thought to be an internal threat only. A simple search... Schneider Electric PLCs Vulnerability Takes into Consideration Undetectable Remote Takeover August 9, 2021 Researchers at a security platform named Armis have recently discovered a critical Schneider Electric PLCs vulnerability. It poses a threat... PrintNightmare: A Critical Windows Print Spooler Vulnerability July 6, 2021 On June 30th, 2021 the CERT Coordination Center released VulNote for a critical remote code execution vulnerability in the Windows... Risk Assessment: NIST 800-30 vs ISO/IEC 27005 March 19, 2021 Security risk assessment is one of the key phases of the risk management process. Above all, it refers to the... Malware for macOS managed to infect 40,000 of computers March 8, 2021 Cybersecurity research uncovered a new malware for macOS, which managed to infect almost 40,000 computers over the past couple of... Latest: North Korea-backed campaign is targeting cybersecurity researchers January 28, 2021 Google’s Threat Analysis Group (TAG) has recently published a report detailing how a campaign backed by the government of North... What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT... Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge.... CISA Urged Admins To Apply The Security Update To Patch Vulnerability In OpenSSL December 29, 2020 On December 8, 2020, OpenSSL issued a security update for a high severity DoS vulnerability that affects the open-source project.... How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... Supply Chain Attacks And Third-Party Risk Management December 23, 2020 In real terms, third-party risk management is about identifying the vulnerabilities of your outside vendors and determining approaches to overcome... Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you... Common Mistakes That CISOs Do And How To Avoid Them November 17, 2020 News about data breaches continue to come up, and their pace is only getting faster. It is only becoming easier... What is black box Pentesting? October 28, 2020 Organizations implement a broad range of security measures to maintain a sound security posture. These security measures can be either...
Attackers Exploiting Companies That Use Advanced VPNs November 19, 2021 Virtual Private Networks (VPNs) have long been an essential part in the operation of modern businesses. They have recently become...
Check Your Company’s Confluence Server ASAP! September 7, 2021 Initially when the Confluence Server Vulnerability was discovered, it was thought to be an internal threat only. A simple search...
Schneider Electric PLCs Vulnerability Takes into Consideration Undetectable Remote Takeover August 9, 2021 Researchers at a security platform named Armis have recently discovered a critical Schneider Electric PLCs vulnerability. It poses a threat...
PrintNightmare: A Critical Windows Print Spooler Vulnerability July 6, 2021 On June 30th, 2021 the CERT Coordination Center released VulNote for a critical remote code execution vulnerability in the Windows...
Risk Assessment: NIST 800-30 vs ISO/IEC 27005 March 19, 2021 Security risk assessment is one of the key phases of the risk management process. Above all, it refers to the...
Malware for macOS managed to infect 40,000 of computers March 8, 2021 Cybersecurity research uncovered a new malware for macOS, which managed to infect almost 40,000 computers over the past couple of...
Latest: North Korea-backed campaign is targeting cybersecurity researchers January 28, 2021 Google’s Threat Analysis Group (TAG) has recently published a report detailing how a campaign backed by the government of North...
What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT...
Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge....
CISA Urged Admins To Apply The Security Update To Patch Vulnerability In OpenSSL December 29, 2020 On December 8, 2020, OpenSSL issued a security update for a high severity DoS vulnerability that affects the open-source project....
How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place....
Supply Chain Attacks And Third-Party Risk Management December 23, 2020 In real terms, third-party risk management is about identifying the vulnerabilities of your outside vendors and determining approaches to overcome...
Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you...
Common Mistakes That CISOs Do And How To Avoid Them November 17, 2020 News about data breaches continue to come up, and their pace is only getting faster. It is only becoming easier...
What is black box Pentesting? October 28, 2020 Organizations implement a broad range of security measures to maintain a sound security posture. These security measures can be either...