Monthly Archives: January 2022
How Passwordless can Help us Win the Ransomware War
By Hemen Vimadalal is CEO and founder of 1Kosmos Approximately $590 million in ransomware payments were made in the U.S. in the first six months of 2021, more than the […]
Our Cyber Defenses Need to Be Battle-Tested to Withstand Future Threats
By Hugo Sanchez, Founder and CEO of rThreat Just a few weeks ago, the FBI released a statement confirming that their server was hacked over the weekend, resulting in thousands […]
Cybersecurity Experts Share Their Predictions for 2022
By Danny Lopez, CEO of Glasswall The year 2021 raised many major cybersecurity concerns including the rise in ransomware attacks, phishing scams, and data breaches. Many organizations have embraced a […]
Three Key Facts About AI-Driven Network Detection and Response
By Eyal Elyashiv, CEO, Cynamics Most network detection and response solutions and network performance monitoring and diagnostic tools are using the same paradigm that was invented three decades ago. However, networks themselves […]
Protecting Critical Infrastructure Against Cyberattacks
Understanding how attackers get in is the critical first step to mounting an effective defense. By Sean Deuby | Director of Services, Semperis Cyberattacks in any industry cause multiple forms […]
What Are DeFi Flash Loans & How to Prevent Flash Loan Attacks?
Decentralized Finance is changing the way we borrow and invest. Flash loans, a type of uncollateralized lending, have gained in popularity, as well as bad press. Flash loan attacks are […]
WatchGuard Technologies’ 2022 Predictions: State-Sponsored Mobile Threats, Space-Related Hacks and More
A look at the future of cybersecurity in 2022 and beyond By Corey Nachreiner, Chief Security Officer, WatchGuard Technologies 2021 was another wild year in cybersecurity with the industry facing […]
OT/IT Security – Two Sides of the Same Coin
By Sachin Shah, CTO of OT, Armis The distinction between information technology (IT) and operational technology (OT) is rapidly converging as the Industrial Internet of Things (iIoT) – with cross-boundary […]
Looking Ahead: Five Security Trends For 2022
A look at some of the key security trends for next year By Mark Guntrip, Strategy Leader at Menlo Security. Ransomware and the fight back Ransomware has dominated the […]
Prominent Carding Marketplace UniCC announced it’s shutting down
One of the biggest underground carding marketplaces, UniCC, announced it’s shutting down its operations. UniCC, one of the biggest underground carding marketplaces announced it is shutting down. The site was […]
First Steps to Alleviate Long-Term Consequences from A Cyberattack
Brief Guide By Sergey Ozhegov, CEO, SearchInform When a cyberattack occurs it is easy to panic and forget all the steps you have been told to make before. What is […]
Russian government claims to have dismantled REvil ransomware gang
Russia’s FSB announced to have dismantled the REvil ransomware gang, the infamous group behind Kaseya and JBS USA. The Russian Federal Security Service (FSB) announced to have shut down the […]
Why Americans Joined Europe in Not Paying Security Ransoms
By Lee Pitman, Global Head of Response Services, BreachQuest As we close out 2021, the biggest trend in the security and insurance space has to be the heightened regulatory scrutiny […]
Microsoft Successfully Defended The Azure Cloud From A Massive DDOS Attack. (Spoiler: You Can, Too.)
How can you fend off the largest DDoS attack in history? For Microsoft, early detection and investing in software as a service was key. Read on to learn more. By […]
USCYBERCOM: MuddyWater APT is linked to Iran’s MOIS intelligence
US Cyber Command (USCYBERCOM) has officially linked the Iran-linked MuddyWater APT group to Iran’s Ministry of Intelligence and Security (MOIS). USCYBERCOM has officially linked the Iran-linked MuddyWater APT group (aka SeedWorm and TEMP.Zagros) […]
How to Avoid Spam Texts and Protect Personal Information in the Digital Age
With Spam Texts on the Rise Consumers Must do their Due Diligence By Reinhard Seidel, Director Products at Clickatell How to Avoid Spam Texts and Protect Personal Information in the […]
What Are DeFi Flash Loans & How To Prevent Flash Loan Attacks?
Flash loans, a type of uncollateralized lending, have gained in popularity, as well as bad press. Flash loan attacks are a common threat that enable hackers to steal massive amounts […]
Why Hackers Attack Mobile Devices and How to Prevent It
By Nicole Allen, Marketing Executive at Salt Communications According to a Gallup poll, the frequency of remote work cyber-attacks has nearly doubled since the beginning of the pandemic. Employees were […]
FIN7 group continues to target US companies with BadUSB devices
The Federal Bureau of Investigation (FBI) warns US companies that the FIN7 cybercriminals group is targeting the US defense industry with BadUSB devices. The US Federal Bureau of Investigation issued […]
It’s 2022 And Cyber Deception Has Arrived – Defeat Tomorrow’s Threat Today
Lessons from The Cheshire Cat in Concealment & Misdirection Cyber deception has come a long way from deploying honeypots on the external interface to research attack activity. Nowadays, deception technology […]
Cybersecurity Alone Is Not Enough, Systems Need Cyber Resiliency
Electronics systems today need to go beyond preparedness for an attack to resiliency during and after one. By Eric Sivertson, VP of Security Business Development, Lattice Semiconductor The National Vulnerability […]
Phishing: How To Improve Cybersecurity Awareness
By Jason Stirland, CTO at DeltaNet International According to research by Proofpoint, 75% of organizations around the world experienced a phishing attack in 2020, and 74% of attacks targeting US businesses were […]
Getting Started with Active Directory Security
Evaluating, Benchmarking and Creating a Strategy By Justin Kohler, Director of BloodHound Enterprise, SpecterOps Over 90% of the Fortune 1000 use Microsoft Active Directory (AD) for identity and access management. […]
How To Thwart Fraud with Phone Numbers
By Guillaume Bourcy, Vice President, Data & Identity Solutions, TeleSign During the peak of the global pandemic, online shopping and cybercriminal activity hit unprecedented figures, hitting merchants’ bottom lines hard. […]
Surviving The New Era of Terabit-Class DDoS Attacks
By Richard Hummel, Threat Intelligence Lead, NETSCOUTy In March 2018, a massive Distributed Denial of Service (DDoS) disrupted service for the developer platform GitHub. The attack, which lasted for approximately […]
“Owning Your Identity” Through Biometric and Passwordless Innovations
By Bob Eckel, CEO, Aware Consumers around the world have become increasingly comfortable engaging with businesses digitally. Between 2020 and 2021, driven in part by the pandemic, the proportion of […]
12 Tips for Improving Access Control in Your Organization
By Bryon Miller ASCENT In today’s world, we have more access to essentially all that’s available in our lives. More access to people and places. More access to information and […]
North Korea-linked threat actors stole $1.7 billion from cryptocurrency exchanges
North Korea-linked threat actors are behind some of the largest cyberattacks against cryptocurrency exchanges. North Korea-linked APT groups are suspected to be behind some of the largest cyberattacks against cryptocurrency […]
The Great Resignation, The Quiet Resignation – Five Security Awareness Countermeasures to Security Threats Derived from these Workforce Trends
By Omer Taran, CTO & Co-Founder, CybeReady According to Fortune Magazine, 40% of U.S. employees are considering an exit from their current place of business. This trend, which has been […]
Cyber (In)Secure: Business Sentiment on Cyber Security Challenges
By James Edgar, Senior Vice President and Chief Information Security Officer, FLEETCOR Undoubtedly the last two years have been incredibly challenging for businesses, as many companies grappled with the health […]