NIST Incident Response Plan: Steps and Template
July 7, 2022
In the ‘Computer Security Incident Handling Guide,’ also known as SP 800-61 Rev. 2, the National Institute of Standards and Technology, generally known as NIST, provides its Cybersecurity Incident Management and Response guidelines. NIST Incident Response Plan: The book explains how to…
0 Comments9 Minutes
Black Basta Ransomware Emerging Threat out in the wild, Cyber Security Experts Warn
July 5, 2022
Black Basta Ransomware (RaaS) syndicate has claimed nearly 50 victims in the United States, Canada, Australia, New Zealand, and the United Kingdom within two months of its debut. In a short amount of time, it has become a significant threat. Black Basta Ransomware has targeted various…
0 Comments7 Minutes
Google Password Manager Enhances the Security Across all its Platforms
July 4, 2022
Google Password Manager unveiled several updates to its service on Thursday to unify the device user experience. According to Ali Sarraf, product manager for Google Chrome, the changes focus on a “simplified and unified Google Password Manager experience that is the same for all Chrome and…
0 Comments2 Minutes
Small Office/Home Office Routers taken over by ZuoRAT, a Malware that Spies on Networks
July 4, 2022
ZuoRAT Malware attacks Small office/home office (SOHO) routers, a previously unknown remote access trojan as part of a sophisticated operation aimed at North American and European networks. ZuoRat Malware: According to Lumen Black Lotus Labs experts, this malware allows the actor to pivot into the…
0 Comments5 Minutes
AVERAGE RANSOM PAYMENT HAS GONE UP TO 71% IN 2022
June 5, 2022
Palo Alto Network’s threat intelligence arm, Unit 42, has found the average ransomware payment in cases worked by Unit 42 incident responders rose to US$925,162 during the first five months of 2022, approaching the unprecedented US$1 million mark, a 71 percent increase from last year. That total…
0 Comments3 Minutes
What is data retention and why is it important?
May 22, 2022
It’s not uncommon to hear about businesses storing large volumes of personal data. There are endless reasons as to why personal data may be collected and processed, such as to build user profiles in order to send targeted products and services. However, many businesses fail to consider what…
0 Comments5 Minutes
5 Tips for Measuring Your Company’s Security
May 5, 2022
Cybersecurity is a priority for any organization and a big-ticket budget line item. But before investments in security are made, your organization must understand what it is doing right and where improvements to your cybersecurity program are needed. Businesses can significantly improve their…
0 Comments9 Minutes
The Log4j Vulnerability is Not Over Yet – Microsoft Reports More CVEs
January 17, 2022
The vulnerability mayhem has been the talk of the cyber town for slightly over a month now. Log4j or the Log4Shell vulnerability is best known for its dire impact on some of the biggest businesses in the tech world like Twitter, AWS, Minecraft, and several others. As most people know, this attack…
0 Comments6 Minutes
Cryptojacking: an Insidious Threat that goes Beyond Virtual Currencies
November 29, 2021
Your computer’s fan is spinning like crazy. You feel like your laptop is overworking all the time, and soon it’s going to go “kaboom.” It may be a cryptojacking attack. The subject of cryptocurrency has become controversial in recent years as these virtual assets continue…
0 Comments6 Minutes
Cybersecurity Solutions – The 10 Best Tips for Employees Working Remotely
October 20, 2021
Trick-or-treating may capture much of the attention this month, but for years Halloween has competed with another significant event. Check out these great tips from a Cybersecurity Solutions company. As we continue with this topic, the theme for week three revolves around working and networking.…
0 Comments10 Minutes