Colonial Pipeline Hack: What We Know So Far

Colonial Pipeline Hack: What We Know So Far

Colonial Pipeline Hack: A Ransomware Attack On May 7th, Colonial Pipeline announced that it has been the victim of a serious cyberattack. The issue forced the company to shut down its entire network, leading to major disruptions in its operations. By attempting to isolate and contain the threat, Colonial Pipeline was also forced to put […]

Stakeholders’ Personal Records Leaked in Recent Shell/Accellion Breach

Stakeholders’ Personal Records Leaked in Recent Shell/Accellion Breach

Shell, the multinational oil giant, disclosed in late March that the personal information of some of its stakeholders and business data from linked organizations have been compromised after a successful attack on its network.  It was disclosed by the company that a still-unknown malicious agent breached into the system, accessing files containing sensitive data belonging […]

Japan’s Industries Targeted by Hackers Employing Backdoors

APT10, also known as Stone Panda, Cicada, POTASSIUM, and Red Apollo, was found to be behind a series of cyberattacks targeting industry sectors in Japan as part of a large, long-running campaign against the Asian country.

APT10, also known as Stone Panda, Cicada, POTASSIUM, and Red Apollo, was found to be behind a series of cyberattacks targeting industry sectors in Japan as part of a large, long-running campaign against the Asian country. By using novel malware, APT10 attacked companies deploying malicious backdoors in a sophisticated fashion. With these backdoors, the group […]

Homeland Security Bets On Upgraded Cybersecurity Protection for the Nation

Homeland Security Bets On Upgraded Cybersecurity Protection for the Nation

In the last few years, the United States has been the victim of serious cybersecurity threats that weren’t managed adequately. With time, the rivalry between the US and its international contenders, such as China, Russia, Iran, and North Korea, has shaped a new kind of battleground, one that focuses on disrupting digital information and technology. […]

Understanding the Real Cost For Your Business

Cybersecurity Budget: Understanding the Real Cost for your Business

Cybersecurity Budget: Understand The Real Costs For Your Business Updated on 08/01/2021  In today’s modern industrial age, cybersecurity protocols play a more important role than ever in every business. Once the decision-makers have decided to invest in cybersecurity, they will then ask: how much do companies spend on cybersecurity? How much should I spend for […]

WatchDog Botnet Hacked Windows and Linux Servers Worldwide for Illegal Crypto-mining

WatchDog Botnet Hacked Windows and Linux Servers Worldwide for Illegal Crypto-mining

A botnet known as WatchDog has been operating for two years with the goal of crypto-mining in private servers all around the world. With the rising prices of different cryptocurrencies that are being easily traded right now, crypto-mining has become a very attractive illegal activity for cybercriminals. This discovery, made by Unit 42, reinforces the […]

How to Make the Most of Your Cybersecurity Dashboard

How to Make the Most of Your Cybersecurity Dashboard

Every year we see new products and iterations of dashboards that aim to make our job in cybersecurity easier. The goal of these dashboards is, at least in theory, to keep us informed and knowledgeable. Dashboards provide us with a plethora of information, presented in digestible ways, most of the time by using graphs and […]

Using Big Data to Improve Cybersecurity in Your Organization

Using Big Data to Improve Cybersecurity in Your Organization

With cyberattacks becoming more common not only in corporate setups but also for small and mid-sized businesses, we have the pressing task of protecting our assets from threats lurking online. We are referring to malicious agents who are actively working to infiltrate our networks and devices, steal our data and identities, and ultimately profit from […]

Cybersecurity Agencies Recommending Against Obsolete Protocols

Cybersecurity Agencies Recommending Against Obsolete Protocols

Well-known cybersecurity agencies in the United States and the Netherlands issued recommendations against the use of obsolete TLS protocols that put the networks and users at risk.  In early January, the NSA, the main cybersecurity agency in the US, issued an advisory that recommended with great emphasis to stop the use of obsolete TLS and […]