Category: News
Power the SOC of the Future with the DataLinq Engine – Part 3
Power the SOC of the Future with the DataLinq Engine – Part 3 LEON WARD In my first blog in this three-part series, we discussed the importance of data to […]VPNLab[.]net Service Shutdown, Aftermath of Kronos Attack, Public Sector Ransomware Attacks in 2021, Data-wiping Software Targets Ukraine, APT35 Uses PowerShell Log4j Backdoor
Law enforcement agencies across 10 nations, including the FBI shut down a 15-server VPN operation used by cybercriminals to anonymize ransomware attacks. According to Ukranian law enforcement, VPNLab[.]net provided cover for at least 150Symphony Technology Group Announces the Launch of Extended Detection and Response Provider, Trellix
SAN JOSE, Calif., January 19, 2022—(BUSINESS WIRE)— Symphony Technology Group (STG) announced today the launch of Trellix, a new business delivering extended detection and response (XDR) to organizations with a focus […]The Chaos Ransomware Can Be Ravaging
The Qualys Research Team has observed a new version of Chaos ransomware in development. This blog reviews the malware’s updated functionality as well as its ongoing evolution. A ransomware builder […]Hybrid Work Global Survey 2021 | Riverbed | Aternity
Hybrid work is the new norm and critical to organizational success—but the question is, are you ready to support the hybrid workplace? To assess the benefits and challenges of a […]Modern DDoS defenses for National Networks – combining network visibility in Design and Implementation
Distributed Denial-of-service (DDoS) attacks continue to accelerate and evolve into highly sophisticated vectors, threatening any digitally connected entities and services; specifically, the entry of connectivity to the global /localThe coming reckoning: Showing ROI from threat intelligence
Threat intelligence has been a part of cyber defense processes in the private sector for nearly a decade now. Many threat intelligence teams were initially composed of classically trained intel operators […]Protecting the Most Dangerous Door to Data Loss
Email is the most popular threat vector for attackers to use for delivering malware to an organization. Email is also a direct line of contact between users and cybercriminals, leading […]Why Cybersecurity Cannot Be Separated from National Security
In the episode, Alperovitch brings a particularly important perspective to the table as we think about threats like ransomware or supply chain attacks. To decontextualize the technology from politics is […]Essential Cybersecurity Survival Strategies for 2022 & Beyond (New Guide!) | BeyondTrust
In cyberspace, there exists no safe harbor. Every organization with a digital presence is exposed like an island amidst an angry, implacable ocean that seems to send wave after wave […]Load More