HomeDefense

Defense

Lessons Learned: In the Principle Of “Least Privilege,” Where Do Companies Fall Short?

By Raj Dodhiawala, President, Remediant Lateral movement using compromised admin credentials is integral to almost all ransomware and...

Top 10 Reasons Cyber Defense Firms Should Hire Veterans

Technology expert and former military intelligence officer shares insight on the valuable skills that veterans can bring...

Endpoint Malware and Ransomware Volume Already Exceeded 2020 Totals by the End of Q3 2021

By Corey Nachreiner, CSO, WatchGuard Technologies The cybersecurity landscape of today is constantly evolving and threat actors are...

It’s 2022 And Cyber Deception Has Arrived – Defeat Tomorrow’s Threat Today

Lessons from a Cheshire Cat in Concealment and Misdirection Cyber-deception has come a long way from deploying honey...

Conti ransomware gang exploits Log4Shell bug in its operations

The Conti ransomware gang is the first ransomware exploit of Log4Shell vulnerability to target VMware vCenter servers....

Experts warn of attacks exploiting CVE-2021-40438 flaw in Apache HTTP Server

Threatening players exploit flaw CVE-2021-40438 recently fixed on Apache HTTP servers, warns German cyber agency and Cisco. Threatening...

Ransomware attack disrupted store operations in the Netherlands and Germany

The electronics retail giant MediaMarkt was hit by a ransomware attack that disrupted store operations in the...

AbstractEmu, a new Android malware with rooting capabilities

AbstractEmu is a new Android malware that can root infected devices to take complete control and evade...

Want to stay up to date with the latest news?

We would love to hear from you! Please fill in your details and we will stay in touch. It's that simple!