Search Results

Closed-circuit television - Security

How to Handle Cybersecurity Challenges of Remote Workers

The actual pandemic has dramatically changed the way most of the companies are working to adapt to this new reality we are facing. Because of that, we want to make you some specific suggestions to be focused on in order to help you to survive this situation. The security on the endpoint goes beyond having an …

How to Handle Cybersecurity Challenges of Remote Workers Read More »

Berserker - Bears

Russian Hackers Stole Data from U.S. Government Networks

Earlier this week, the United States government reported that a Russian APT Actor has successfully compromise U.S. government networks. In their security advisory, the FBI and CISA explain that the APT actor exploits well-known windows bugs to obtain credentials and scale privileges.

Microsoft Takes Down TrickBot – How Long Did It Last?

Microsoft and its partners started working on gathering information to take down Trickbot’s back-end infrastructure. They analyzed over 186.00 TrickBot samples, which lead them to the command-and-control C2 infrastructure and identify its IP address.

Ransomware-as-a-Service (RaaS): The New Business Model for Ransomware Developers

As Ransomware becomes popular and demand increased, cybercriminal organizations have found the perfect way to supply this demand and increase their profit. Ransomware-as-a-Service (RaaS) appears as a new twist to the typical Ransomware and is sold freely in the Dark web.
Trojan horse - The Real Trojan Horse

SLOTHFULMEDIA: The New Remote Access Trojan

Last week the Cybersecurity and Infrastructure Security Agency (CISA) and the Cyber National Mission Force (CNMF) identified a new malware variant dubbed SlothfulMedia, which has been used by a “sophisticated cyber actor.”
Car - Self-driving car

Top 3 Security Risk That Threatens Autonomous Vehicles

In the past few years, almost every famous car manufacturer seems to be in a race for producing the perfect version of self-driving cars. These vehicles are expected to improve traffic flow and safety; however, they also represent a new target for cybercriminals.
Image - Photograph

Top 3 of Emerging threats in 2021

2020 is almost over, and it has been a wild ride so far. The new normal pushed companies to evolve the way they handle business and how their employees interact with the system. There were enterprises prepared for this scenario, while others were victims of their false sense of security. There is no doubt that a good security strategy makes a big difference, and today we should start thinking ahead and be prepared for 2021 surprises.
The Perfect Guide to Artificial Intelligence: Understanding AI with Effective Step That Makes You An AI Guru - Intelligence

The Role Of AI In Cybersecurity

There is a big debate about whether AI (Artificial Intelligence) is good o bad in terms of privacy and its impact on humans’ life. Nevertheless, it’s become the perfect tool to calculate the best action based on characteristics and behavior.
2019–20 coronavirus pandemic - COVID-19 vaccine

Ransomware in times of COVID

Cyber criminal historically has leveraged a global phenomenon for personal gain, and COVID-19 wasn’t the exception. Since the pandemic started, the reports of cyber attacks have ramp-up. In fact, according to Iomart, a cloud computing company, the number of breaches has increased by 273% in the 2020 first quarter compared to the same time last year.
German Shepherd - Rottweiler

5 Reasons Why You Need a Cyber Risk Assessment

The key to minimize cybersecurity threats and their impact is to achieve and maintain the right security level. Organizations can’t rely on their security strategy unless they conduct a regular cyber risk assessment.
Product design - Black and white

Human Factor: The Achilles Heel of Cybersecurity

Despite technology advances and policies in place, the human factor is still the vulnerability that cannot be defeated. There is not a magic formula or technology that can prevent a bad actor or an innocent mistake end up in huge losses.
Bulletproof vest - BulletSafe Bulletproof Vest Level IIIA

3 Benefits of Penetration Testing

Pen Testing is a simulated cyberattack that evaluates the security of a company environment. Pen testing attempts to safely compromise application systems, servers, network devices, among others. This effort validates the efficiency of defensive mechanisms, uncover vulnerabilities, and end-user adherence to security policies.
Humour - Clown

5 Common Cyber Attack Vectors

Cross-site Scripting and Cross-site request forgery are very common client-site attacks against web apps. XSS executes scripts in the victim’s machine to gain users privileges the CSRF forge request on the victim’s behalf.

The Cost of Convenience – IoT a Blessing and a Curse for Modern Enterprises

Cross-site Scripting and Cross-site request forgery are very common client-site attacks against web apps. XSS executes scripts in the victim’s machine to gain users privileges the CSRF forge request on the victim’s behalf.
Cross-site request forgery - Cross-site scripting

XSS vs CSRF

Cross-site Scripting and Cross-site request forgery are very common client-site attacks against web apps. XSS executes scripts in the victim’s machine to gain users privileges the CSRF forge request on the victim’s behalf.