Last year, when WannaCry and NotPetya striked worldwide, many businesses and governments were put on high alert.
Malware
Allscripts and DGH: Recent Ransomware Attacks and Responses
The new year is starting off with several ransomware attacks, including a high-profile attack at Allscripts. This particular incident highlights the significant time needed…
Zyklon Malware Campaign Exploits Microsoft Office
Another dangerous malware case has been on the rise and it is exploiting human negligence and out of date software. The name of the…
Darknet Chronicles Pt 8: Fortifying Against Insider Threats
This collection of eight articles will focus on bridging the gap between stolen information, insider threats, and the darknet. You can expect to learn…
2018 Cyber Security Predictions [Infographic]
The year 2017 is ending as a record year for data breaches. From the Equifax data breach to the Uber data scandal, there's plenty…
Darknet Chronicles Pt 6: Where Malware is Born
Ever wondered where all of the malware and ransomware is coming from? The answers may surprise you, and that enigma of the hacker that…
5 Tips to Protect Your Small Business From the Darknet
According to research from Symantec, 43 percent of cyber attacks are lodged against small businesses. Many of these attacks begin with tools and techniques…
How to Protect Against Malware Infections: The Top Experts Speak
Malware. The annoying and hostile malicious software that’s main objective is to access or damage your computer system usually without knowledge by you the…
The Malware Uprise: Why is it a Common Story?
Malware attacks are a common story today, causing headlines from across the globe. What’s driving the rise of malware? Let’s take a look at…
The Rise of Threat Hunting
A SANS Institute survey of those organizations engaged in threat hunting reported that 74% of respondents cited reduced attack surfaces and 52% found previously…
Living off the Land Attacks: The Underground Economy and Ransomware
‘Living off the land’ has traditionally meant a reliance on surviving through hunting, gathering, or subsistence farming. The meaning is much darker when we…
Types of Cyber Security Threats and What You Can Do About Them
Whether the motive is profit (cyber crime and cyberespionage), making a statement (cybernuisance), or national interest (cyberwarfare), hackers have multiple types of cyber security…