Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

Russian government claims to have dismantled REvil ransomware gang

Russia’s FSB announced to have dismantled the REvil ransomware gang, the infamous group behind Kaseya and JBS USA. The Russian Federal Security Service (FSB) announced to have shut down the…

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Comments Off on Russian government claims to have dismantled REvil ransomware gang

USCYBERCOM: MuddyWater APT is linked to Iran’s MOIS intelligence

US Cyber Command (USCYBERCOM) has officially linked the Iran-linked MuddyWater APT group to Iran’s Ministry of Intelligence and Security (MOIS). USCYBERCOM has officially linked the Iran-linked MuddyWater APT group (aka SeedWorm and TEMP.Zagros)…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , | Comments Off on USCYBERCOM: MuddyWater APT is linked to Iran’s MOIS intelligence

How to Avoid Spam Texts and Protect Personal Information in the Digital Age

With Spam Texts on the Rise Consumers Must do their Due Diligence By Reinhard Seidel, Director Products at Clickatell How to Avoid Spam Texts and Protect Personal Information in the…

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Comments Off on How to Avoid Spam Texts and Protect Personal Information in the Digital Age

Cybersecurity Alone Is Not Enough, Systems Need Cyber Resiliency

Electronics systems today need to go beyond preparedness for an attack to resiliency during and after one. By Eric Sivertson, VP of Security Business Development, Lattice Semiconductor The National Vulnerability…

Posted in Uncategorized | Tagged , , , , , , , , , | Comments Off on Cybersecurity Alone Is Not Enough, Systems Need Cyber Resiliency

Getting Started with Active Directory Security

Evaluating, Benchmarking and Creating a Strategy By Justin Kohler, Director of BloodHound Enterprise, SpecterOps Over 90% of the Fortune 1000 use Microsoft Active Directory (AD) for identity and access management….

Posted in Uncategorized | Tagged , , , , , , , , , , , | Comments Off on Getting Started with Active Directory Security

Trojan Source attack method allows hiding flaws in source code

Researchers devised a new attack method called ‘Trojan Source’ that allows hide vulnerabilities into the source code of a software project. Trojan Source is a new attack technique demonstrated by…

Posted in Uncategorized | Tagged , , , , , , , , , | Comments Off on Trojan Source attack method allows hiding flaws in source code

12th Anniversary Top InfoSec Innovator & Black Unicorn Awards for 2024 are now Open! Finalists Notified Before BlackHat USA 2024...

X