Attacks

  • Attacks

Log4j: What You Need to Know

Reading Time: 2 minsThe Log4j vulnerability (designated as CVE-2021-44228 by MITRE) affects 1000's of software applications. Here are some quick…

3 years ago
  • Attacks

Recognize the First Signs of a Ransomware Chain

Reading Time: 5 minsRansomware is always preceded by signs that can be identified and stopped. Learn about ransomware chains and…

3 years ago
  • Attacks

Monetization of Cybercrime: It’s All About the Money

Reading Time: 2 minsThe monetization of cybercrime has diversified while deep web credential market activity has been accelerating. Here's why…

3 years ago
  • Attacks

Critical Infrastructure Ransomware Attacks Escalate

Reading Time: 4 minsThe Colonial Pipeline cyberattack highlights the dangers of critical infrastructure ransomware attacks. Here are some takeaways for…

4 years ago
  • Attacks

Lessons from (Another) Florida Ransomware Attack

Reading Time: 4 minsThe $40 million attack on the Broward County public school district is an example of how ransomware…

4 years ago
  • Attacks

Supply Chain Risk: After the SolarWinds Incident

Reading Time: 3 minsSupply chain risk in cybersecurity keeps increasing with threat actors exploiting third-party vulnerabilities. Here's how you can…

4 years ago
  • Attacks

SolarWinds Hack: Immediate Action Items

Reading Time: 2 minsOn December 13th, information was released about the SolarWinds hack, one of the most extensive and serious…

4 years ago
  • Attacks

Prevent Ransomware by Avoiding These 5 Mistakes

Reading Time: 4 minsOver 90% of ransomware attacks are preventable. We have compiled a list of the most common mistakes…

4 years ago
  • Attacks

Malware Delivery as a Service

Reading Time: 4 minsMalware Delivery as a Service is a specialized service designed to meet ransomware's demand for access to…

4 years ago
  • Attacks

When Compromised Infrastructure Has Catastrophic Consequences

Reading Time: 5 minsFinancial institutions, retailers, school districts, hospitals, airlines, public offices will all be future targets of cyberattacks.

5 years ago