Blog

Multiple Groups Have Been Exploiting ETERNALBLUE Weeks Before WannaCry

 

Read more...

Can Firewalls Really Defuse Cyber Threats?

It is commonly agreed  that firewalls have served as a vital weapon in the unrelenting battle against cyber attacks for years. Just to be clear, a firewall is a barrier or shield that is intended...

Read more...

The Ultimate List Of Cyber Security Gurus You Should Be Following On Twitter

Twitter has become a really great place to find out cyber security information. You can even get insider views on the types of threats as they happen, as well as trends in the cyber security...

Read more...

What Is An Invisible Cyber Attack?

One of the most easily resolved scenarios an analyst can face is when an alert is triggered regarding  an abnormality  on an endpoint, whereupon  initial investigation reveals right off that an...

Read more...

Top 4 Incident Response Teams Challenges​

With cyberattacks becoming increasingly sophisticated in recent years, incident responders are drowning in wave after wave of security alerts with which they must grapple daily. Staying on top of...

Read more...

Bridging the Gap Between IT and Security Teams

Thoughts on how to increase cooperation between security and IT teams during incident response for a smoother workflow

Read more...

Casinos don’t gamble when it comes to security – why should you?

If you ever set foot in a Las Vegas casino, you’ve probably noticed the unbelievable amount of visible security. From security guards stationed throughout the casino, to the cameras in the...

Read more...

Time to say "Buh Bye" to post-mortem forensics

Sysinternals, sandboxes, EnCase, FTK, Sleuthkit, DFF, IEF, Wireshark, SIFT, CAINE, COFEE, Volatility, custom scripts in various languages, etc. If any of these names, terms and acronyms are...

Read more...

Reputation Intelligence Feeds – the best way to exhaust the SOC

Just like any good buzz term in the security industry, “Reputation Intelligence” spread like wildfire in our community. Many vendors offered a variety of reputation intelligence feeds like IPs,...

Read more...

Traditional EDR solutions are like treating cancer with Aspirin...here is why

"The era of Anti-Virus is over!" was probably the most common sentence uttered in the security world at the beginning of this decade. At the time, you couldn’t get away from terms like “APT” and...

Read more...

Connect with us

Stay connected

whitepaper banner-280X233.png