What is vulnerability management?

What is Vulnerability Management

Vulnerability Management is the key for a safer future for your organization. It’s safe to say that the WannaCry Ransomware attack was one the worst attacks in recent history, approximately 200,000 devices were infected. Well, what if we told you that this attack could have been easily remediated, I bet you wouldn’t believe us. Well unfortunately that’s the case. The WannaCry Ransomware is just one case of thousands that highlights the...

Read More
Free Ransomware Decrypt if you Infect Two Friends

New Ransomware Offers Free Decryption if you Infect Two Friends

A new ransomware dubbed ‘Popcorn Time’ offers you a free decrypt if you infect two friends. Let’s say it how it is, getting infected with ransomware sucks a lot. You either need to wait it out and hope a free decrypt software comes out or you pay it out (DO NOT PAY). Well, a new breed of ransomware was recently discovered by the MalwareHunterTeam research group. This ransomware allows you to...

Read More
Hacky Hack Hack

Hacky Hack Hack

A 14-year-old Australian boy hacked into Apple servers and downloaded 90GB in documents The 14-year-old teen from Melbourne Australia was found to have broken into Apple servers and downloaded approximately 90GB of information. When law enforcement intercepted him, they confiscated two laptops, a mobile phone and a hard drive. Following this confiscation, the officers found a folder on the network labeled ‘Hacky Hack Hack’, within lay the stolen Apple files. The teen...

Read More
What You Need to Know About the Reddit Breach

What You Need to Know About the Reddit Breach

On August 1st, Reddit announced a breach where an attacker was able to access user data. In an official Reddit post, Reddit made a quick statement and said; A hacker broke into a few of Reddit’s systems and managed to access some user data, including some current email addresses and a 2007 database backup containing old salted and hashed passwords. Since then we’ve been conducting a painstaking investigation to figure out just...

Read More
How the Rise of Cryptocurrencies Fueled Cyber-Criminals

How the Rise of Cryptocurrencies Fueled Cyber-Criminals

Since the start of the year, there has been a fivefold increase in phishing attacks for cryptocurrencies. In 2016, Initial Coin Offerings (ICO’s)- essentially crowdfunding for cryptocurrencies- collected around $240 million. 2017 brought in over $5.5 billion in ICO’s. This exponential increase in value has caught the eyes of all institutional investors, along with inexperienced investors that saw cryptocurrencies as a ‘get rich quick’ opportunity. As history has dictated, any ‘get rich...

Read More
Amazon Prime Day: Christmas for Adults

Amazon Prime Day: Christmas for Adults

Amazon just made the start of this week much better! Prime Day gives you the next 36 hours to completely revamp everything in your house. For those of you unfamiliar with Prime Day, it’s like black Friday where millions of products are placed at massively discounted rates. However, it’s only available to Amazon Prime members. With all these deals it’s easy to lose track and forget about cyber security. Luckily, you’re...

Read More
Solving the Industrial IoT Challenge: How Manufacturing Companies Can Keep Devices Secure

Solving the Industrial IoT Challenge: How Manufacturing Companies Can Keep Devices Secure

Whether manufacturing organizations are retrofitting IoT devices into existing manufacturing equipment or buying new equipment that already includes IoT devices and sensors, it is clear that IoT devices are poised to dramatically improve manufacturing efficiency. The “IoT in manufacturing” market is predicted to grow at a 29% compound annual growth rate to become a $45.3 billion market by 2022.  IoT devices are especially valuable in terms of productivity and planning for...

Read More
Malicious Apps

Malicious ‘Back to School’-Themed Apps Target Young Users Who Don’t Know Better

Bad actors are constantly looking for ways to target unsuspecting users with malware or other digital threats. To increase the likelihood of a successful infection, these nefarious individuals incorporate holidays, current events and significant dates into their attack campaigns. And they are doing so with malicious apps. It’s, therefore, no surprise that digital miscreants are capitalizing on the end of summer by pushing out malicious apps with a focus on “back...

Read More
Two-Factor Authentication

#SecurityTipTuesday: Two-Factor Authentication

Did you know, about 63% of confirmed data breaches involved weak, default or stolen passwords? How can this be solved? Two-Factor Authentication. -- Source: Verizon 2016 Data Breach Investigations Report  Security Tip # 4: Enable Two-Factor Authentication In the wake of countless data breaches, and social media account hacks, ahem, Ariana Grande, we thought it was only fitting to dedicate this week’s advice to the integrity saving, Two-Factor Authentication or 2FA for short. But...

Read More
Brute Force: Anatomy of an Attack

Brute Force: Anatomy of a Cyber Attack, Varonis

The media coverage of NotPetya has hidden what might have been a more significant cyber attack: a brute force attack on the UK Parliament. While for many it was simply fertile ground for Twitter Brexit jokes, a cyber attack like this that targets a significant government body is a reminder that brute force remains a common threat to be addressed. It also raises important questions as to how such a cyber attack could have happened in...

Read More