Penetration Testing, Security Program, Risk Assessment, Privacy, Threat Intelligence

Cuba Ransomware Attacks Five Critical Sectors in the US

Nowadays, the perpetrators of ransomware have gotten more clever in their methods, using complex strategies such as double extortion, in which they not only encrypt the victim's files but also threaten to reveal vital data if the ransom is not paid. They may also use propaganda

Read More

Threat Intelligence

Tips for Managing the Risks of Merges & Acquisition

Along with the benefits of capabilities and growth, mergers and acquisitions add new risks to your attack surface. Managing M&A risk should be part of your organization's overall risk management program. Mergers and acquisitions (M&As) are a

Read More

Threat Intelligence

Why did the DoD Introduce an updated Zero Trust Cybersecurity Framework

The concept of 'Zero Trust, ' which essentially presumes conventional perimeter protections don't exist, has been in cybersecurity for many years. Driven by the evolving threat landscape as well as maturing defensive frameworks, on November 22,

Read More

Threat Intelligence

DDoS for the Holidays

Many find the holidays season exciting because they can relax, spend time with family and friends, and celebrate traditions. Additionally, most businesses have plenty to celebrate throughout the holidays since they usually have higher sales and

Read More

Threat Intelligence

The New Trends in Ransomware that Impacted U.S. Businesses in 2022

Without a doubt, the increased frequency and intensified scale of ransomware attacks are becoming a significant issue for tens of thousands of companies worldwide. For example, between January 2020 and July 2022, companies in the United States were

Read More

Threat Intelligence

Phishing Attacks hit Record High in 2022

According to the Anti-Phishing Working Group (APWG), an international coalition of counter-cybercrime responders, phishing attacks climbed to a new record high in 2022. The APWG Report analyzes phishing attacks and other identity theft techniques,

Read More

Threat Intelligence

IoT Security –Who’s Controlling the Machines on Your Network?

Internet of things (IoT) devices are prevalent in our home and business lives. Embedded devices have revolutionized manufacturing, industrial, supply chain management, logistics, retail, infrastructure management, food production, surveillance, and

Read More

Threat Intelligence

The Cyber-threat Landscape; Where are we now? August 2022

Headlines: Experts agree remote workers and BYOD have permanently changed the threat landscape. Quantum computing is emerging as an encryption-breaking tool leading NIST to nurture post-quantum cryptography algorithms. Ransomware is peaking as a

Read More

Threat Intelligence

Threat Intelligence: TraderTraitor, Maui Ransomware and the MSTIC H0lyGh0st

In the news recently,  more hijinks from our infamous foes, North Korean state-sponsored attackers; The evolving gang of thugs who brought us disruptive malware like the 'WannaCry' ransomware, colorful variants like 'SLICKSHOES,' 'CROWDEDFLOUNDER,'

Read More