+1.813.321.0987
InfoSec Articles (04/25/2022 – 05/09/2022)

InfoSec Articles (04/25/2022 – 05/09/2022)

Over the last two weeks, we saw new LinkedIn scams, where cybercriminals attack when we may be at our most vulnerable – here’s what to look out for and how to avoid falling victim to fraud when using the platform. Also, check out “The Strange Link Between A...
InfoSec Articles (04/25/2022 – 05/09/2022)

InfoSec Articles (04/11/2022 – 04/25/2022)

Over the past two weeks, we saw that In February 2022, CISA, FBI, the U.S. CCNMF, the United Kingdom’s NCSC-UK, and NSA released a joint statement regarding their observation of Iranian government-sponsored APT MuddyWater and their malicious cyber activity. MuddyWater...
InfoSec Articles (04/25/2022 – 05/09/2022)

InfoSec Articles (03/28/2022 – 04/11/2022)

Over the last two weeks, we saw that “from the beginning of 2022, we have dealt with six different strains of wiper malware targeting Ukraine: WhisperKill, WhisperGate, HermeticWiper, IsaacWiper, CaddyWiper, and DoubleZero. These attacks are notable on their...
InfoSec Articles (03/15/2022 – 03/28/2022)

InfoSec Articles (03/15/2022 – 03/28/2022)

Over the last two weeks, we saw that KELA published a report on ransomware operators’ overall trends and movements over 2021. The cybersecurity firm says that the number of major organizations tracked as ransomware victims increased from 1460 to 2860. In addition, the...
InfoSec Articles (02/28/2022 – 03/15/2022)

InfoSec Articles (02/28/2022 – 03/15/2022)

Over the last couple of weeks we saw On February 24, 2022, Anonymous — a global collective of hackers — announced it was launching a cyber operation against Russian President Vladimir Putin and the Russian state for invading Ukraine. At 2:50 PM EST on February 24,...
Threat Intelligence Data Providers vs Threat Intelligence Platforms

Threat Intelligence Data Providers vs Threat Intelligence Platforms

In information security, the ability to predict and adapt to the behaviors of criminals can help organizations improve defense strategies against cyber threats. This can be done through the use of threat intelligence where data comprised of past and current indicators...