Monthly Archives: March 2019
Operation eligible receiver – the birthplace of cyber security: vulnerabilities
by Josh Paape More than 20 years ago, the NSA conducted an exercise named Operation Eligible Receiver 97. The purpose of the exercise was to test the response capabilities of […]
Top 10 tips for word-press website security
By Julia Sowells, Security Expert, Hacker Combat WordPress, which is a very commonly used CMS, powers a third of the world’s websites. An […]
Local backups may not keep your business safe from ransomware
by Karl Zimmerman In the last few years, a series of devastating ransomware attacks have cost businesses billions of dollars. Ransomware doesn’t discriminate: businesses of all sizes have been hit […]
Want to protect your online customers? Keep your website safe
By Pedro Fortuna, Co-founder and CTO Jscrambler How would you know if your users were being compromised on the client-side whilst logging on to their bank account online? How confident […]
How to protect your business from cyber-attacks?
By Ravindra Savaram, Vmonlinetraining and Tekslate Introduction Cyber threats have become a scary reality with a high percentage particularly targeting individuals and businesses. No matter what the company’s government stature […]
Best practices for ddos mitigation in the terabit attack era
By Tom Bienkowski, Director, DDoS Product Marketing, NETSCOUT Arbor IoT botnets changed the DDoS attack landscape, but not necessarily in the way, many people thought they would. The Mirai IoT […]
A new AZORult C++ variant can establish RDP connections
Experts from Kaspersky observed a new C++ version of the AZORult data stealer that implements the ability to establish RDP connections. The AZORult Trojan is one of the most popular […]
The impact of soar on incident response steps
How automation and orchestration affect nest’s framework for incident response By Stan Engelbrecht, Director of Cybersecurity Practice, D3 Security As cybersecurity incidents such as phishing scams, ransomware attacks, and user […]
2018 is late but still the right time to bid goodbye to malware prone SMBv1
Upgrade to an encrypted SMB version 3 By Tal Widerman, Marketing Manager, Visuality Systems 2018 is Late but Still the Right Time to Bid Goodbye to Malware Prone SMBv1 Much […]
Let passwords go extinct
OR, IT’S TIME FOR PASSWORDS TO EVOLVE by Chris Mindel, Marketing Manager, Dexter Edward LLC Passwords are Dinosaurs Let’s face it: passwords have become part of the cybersecurity problem. That […]
Norsk Hydro estimates losses between $35M – $41M in the first week after cyberattack
Norwegian aluminum giant Norsk Hydro estimates more than $40 million losses in the first week following the ransomware attack that disrupted its operations. Last week Norwegian Norsk Hydro, one of the […]
Hackers raised fake tornado alarms in two Texas towns
Hackers took control of the emergency tornado alarms in Texas causing the panic, it has happened on March 12th, at around 2:30 a.m., On March 12th, at around 2:30 a.m. […]
Cyber security tips for business travelers
by Luke Adshead, Cyber Security Tips for Business Travelers, Northdoor It doesn’t matter whether you are traveling the world to ‘find yourself’ or you are on a business trip from NY […]
The new way to impact opinions and politics
Psychological operations are upgrading to the 21st cyber century and impacts politics, economies and societies. by Julien Chesaux, Cyber Security Consultant, Kudelski Security Cyber but not New Fake news, disinformation, […]
Transforming cyber security
By Dr. Simon Wiseman, CTO, Deep-Secure Deep-Secure CTO Dr. Simon Wiseman explains how content threat removal is a game-changer in the battle to ensure business content is threat-free by using […]
Where do I “Sign”?
A short Review on Digital Signatures by Joe Guerra, Cybersecurity Instructor, Hallmark University The fundamentals of data security is defined as applying techniques, procedures and other means to protect the confidentiality, availability, […]
Spear-phishing Is The Next Threat After A Data Breach
Employees’ awareness must be a mandatory routine. by Pedro Tavares, CSIRT.UBI and seguranca-informatica.pt Founder During the last years, we have observed a tremendous number of data breaches that have made […]
Role of Identity and Access Management (IAM) in Cyber Security
by Bhavdip Rathod, IAM Solution Architect, Sailpoint Technologies, Inc In today’s digitally enabled world, Identity and Access Management (IAM) plays a critical role in any enterprise security plan, as it […]
Simplifying Cybersecurity Deployments with Automation
Security is a whole lot like quantum mechanics. It’s rife with uncertainty and you can’t observe your infrastructure without affecting it. Following this analogy, it’s vital to have a system […]
Operation ShadowHammer – Supply-Chain attack hit ASUS users
Operation ShadowHammer – ASUS is the last victim of a clamorous supply chain attack that delivered a backdoor to more than one million users, Kaspersky Lab reported. Over 1 million […]
Malware Basics
And a brief on new Self-updating, Anti-viral Malicious Software
Five GDPR Mistakes that Will Put Your Company in Hot Water
by Steve Dickson, CEO, Netwrix Only 29 percent of small businesses and 41 percent of midsize businesses in Europe have taken steps to prepare for the GDPR, according to IDC, and […]
How Do We Get Privacy?
Revisiting the Basics and Importance of Cryptography By Joe Guerra, Cybersecurity Instructor, Hallmark University Since the onset of technology in society, it has broken the levees of data and has […]
Packet Capture Technology is Critical for InfoSec and Regulatory Compliance
This is the first of two articles on packet capture and its vital role in network cyber security. We’ll cover important aspects of the role of effective packet capture in […]
Rampart de Troika: A Three-Step Process to Overcome Cyber security’s Top Threat
by Daniel Jetton, Vice President of Cyber Services, OBXtek The weakest link in most network security is human; however, recent research has determined an effective, three-part process to mitigate the […]
Cyber criminals are searching for the chink in your armor
Learn to find it before they do Source: Regent University Cybercrime is nothing if not dynamic. As soon as bad actors are identified by local site personnel—whether they are adversarial […]
Why Smartphone Security Should Grow Beyond Biometrics
After passwords and traditional biometrics, behavioral biometrics is transforming the security of smartphones by Alex Miller An average user either uses a PIN, pattern or a password to secure his phone. […]
Cyber Forensics: An Academic Partnership with Pittsburgh Technical College
by Professor Phil Grabowski One of the most important aspects to get a Cyber Security or Security Forensics job is to show evidence of work experience, internships, certifications, participating in […]
From Theory To Practice: 5 Applications Of Threat Intelligence
by Jonathan Zhang, Founder, and CEO, Threat Intelligence Platform Threat intelligence (TI) has caught the eye of CSOs and cybersecurity teams seeking to fight cybercrime strategically while allocating IT security […]
5 Common Incident Response Problems that Automation and Orchestration Can Help Solve
by Stan Engelbrecht, Director of Cybersecurity Practice, D3 Security Most companies that are struggling with their incident response program fall into two categories: They don’t realize what their problems are, […]