Three Key Facts About AI-Driven Network Detection and Response
By Eyal Elyashiv, CEO, Cynamics Most network detection and response solutions and network performance monitoring and diagnostic tools are using the same paradigm that was invented three decades ago. However, networks themselves…
Protecting Critical Infrastructure Against Cyberattacks
Understanding how attackers get in is the critical first step to mounting an effective defense. By Sean Deuby | Director of Services, Semperis Cyberattacks in any industry cause multiple forms…
What Are DeFi Flash Loans & How to Prevent Flash Loan Attacks?
Decentralized Finance is changing the way we borrow and invest. Flash loans, a type of uncollateralized lending, have gained in popularity, as well as bad press. Flash loan attacks are…
Prominent Carding Marketplace UniCC announced it’s shutting down
One of the biggest underground carding marketplaces, UniCC, announced it’s shutting down its operations. UniCC, one of the biggest underground carding marketplaces announced it is shutting down. The site was…
Russian government claims to have dismantled REvil ransomware gang
Russia’s FSB announced to have dismantled the REvil ransomware gang, the infamous group behind Kaseya and JBS USA. The Russian Federal Security Service (FSB) announced to have shut down the…
Microsoft Successfully Defended The Azure Cloud From A Massive DDOS Attack. (Spoiler: You Can, Too.)
How can you fend off the largest DDoS attack in history? For Microsoft, early detection and investing in software as a service was key. Read on to learn more. By…
USCYBERCOM: MuddyWater APT is linked to Iran’s MOIS intelligence
US Cyber Command (USCYBERCOM) has officially linked the Iran-linked MuddyWater APT group to Iran’s Ministry of Intelligence and Security (MOIS). USCYBERCOM has officially linked the Iran-linked MuddyWater APT group (aka SeedWorm and TEMP.Zagros)…
How to Avoid Spam Texts and Protect Personal Information in the Digital Age
With Spam Texts on the Rise Consumers Must do their Due Diligence By Reinhard Seidel, Director Products at Clickatell How to Avoid Spam Texts and Protect Personal Information in the…
Why Hackers Attack Mobile Devices and How to Prevent It
By Nicole Allen, Marketing Executive at Salt Communications According to a Gallup poll, the frequency of remote work cyber-attacks has nearly doubled since the beginning of the pandemic. Employees were…
FIN7 group continues to target US companies with BadUSB devices
The Federal Bureau of Investigation (FBI) warns US companies that the FIN7 cybercriminals group is targeting the US defense industry with BadUSB devices. The US Federal Bureau of Investigation issued…
It’s 2022 And Cyber Deception Has Arrived – Defeat Tomorrow’s Threat Today
Lessons from The Cheshire Cat in Concealment & Misdirection Cyber deception has come a long way from deploying honeypots on the external interface to research attack activity. Nowadays, deception technology…
Cybersecurity Alone Is Not Enough, Systems Need Cyber Resiliency
Electronics systems today need to go beyond preparedness for an attack to resiliency during and after one. By Eric Sivertson, VP of Security Business Development, Lattice Semiconductor The National Vulnerability…