Data Breach

Using Penetration Testing to Stop a New Steal ...

Using Penetration Testing to Stop a New Stealth Breed of Ransomware Attacks Ransomware is arguably one of the most insidious and damaging forms of malware. Cybercriminals are continually exploiting newer methods to circumvent strategies by enterprises to thwart ransomware attacks. A recent post by Microsoft on ransomware talks about a […]

COVID-19 Cyber Threat Indicators

COVID-19 Cyber Threat Indicators COVID-19 has produced a worldwide physical virus scare that has everyone on edge. Unfortunately, Hackers have not wasted any time in capitalizing on taking advantage of those suffering from the deadly effects of COVID-19. To prevent further compromise, you must take precautions within your corporate networks […]

Kwampirs Malware targeting Global Industries

Kwampirs Malware targeting Global Industries Including the Healthcare Sector, Supply Chain, Financial Institutions, and prominent Law firms. The Federal Bureau of Investigation (FBI) has sent a security alert to the U.S. private sector about an ongoing attack against the healthcare sector, supply chain software vendors, financial institutions and prominent law […]

When a file acts as a double agent and how to ...

When a file acts as a double agent and how to address it Incident response is a critical security and business function required to keep the integrity of any company in check. How a company reacts when the pressure is on could potentially make or break the financial fallout of […]