What are the 6 Phases in a Cyber Incident Response Plan?

Introduction Cybersecurity is a growing concern for businesses. In a recent survey, 74% of organizations reported experiencing a cybersecurity incident in the last year alone. With so many cyber incidents occurring today, it’s essential to have an incident response plan in place before an attack occurs. It’s important to understand what these phrases mean and […]

How To Create An Effective Cybersecurity Policy

Introduction Cybersecurity is a serious matter for any company, but especially so if your business deals with sensitive information or assets. While there are many things to think about when it comes to implementing a cybersecurity policy, here are some of the most important ones that will help ensure you’re doing everything you can to […]

What is cybersecurity?

The term “cyber” comes from cyberspace, which refers to all electronic information that exists in digital form. This includes data stored on hard drives, memory cards, flash drives, and other storage devices. The field of cybersecurity is constantly evolving, and so are the threats it faces. This means that cybersecurity professionals must remain aware of […]

5 reasons why businesses need Network Firewall Security

Introduction The world of business is changing. Now more than ever, we’re all connected online and we’re facing new threats on a daily basis. A small business firewall allows you to protect your valuable information from security threats while also giving you the ability to monitor network activity and set up rules for proper usage. […]

Google, Mandiant say zero-day numbers reached all-time highs in 2021

Google and Mandiant released reports this week saying the number of disclosed and exploited zero-days reached record highs in 2021. Mandiant said it identified 80 zero-days exploited in the wild, more than double the record volume they saw in 2019. The term zero-day refers to newly-discovered vulnerabilities in which a vendor has zero days to […]

First phase of ‘Hack DHS’ finds over 120 vulnerabilities

Indianapolis – Circa August 2018: Logo and seal of the United States Department of Homeland Security. DHS runs Immigration and Customs Enforcement (ICE) The initial leg of the Homeland Security Department’s first-ever bug bounty program uncovered more than 120 cybersecurity vulnerabilities in some of its external systems, the agency announced on Friday. More than 450 […]

New Log4j attacks target SolarWinds, ZyXEL devices

Image: Possessed Photography // Unsplash Cybercriminals looking to capitalize on the Log4Shell vulnerability are attacking devices from SolarWinds and ZyXEL that are known to have used the Log4j library inside their software, according to two reports published on Wednesday by Microsoft and Akamai. The most urgent of these attacks are those spotted by Microsoft, which said it […]

New MoonBounce UEFI bootkit can’t be removed by replacing the hard drive

Security researchers from Kaspersky said on Thursday that they had discovered a novel bootkit that can infect a computer’s UEFI firmware. What makes MoonBounce—the name they gave the bootkit—special is the fact that the malware doesn’t burrow and hide inside a section of the hard drive named ESP (EFI System Partition), where some UEFI code typically […]

Israel police uses NSO’s Pegasus to spy on citizens

Mayors, leaders of political protests against former Prime Minister Benjamin Netanyahu, and former governmental employees, were among those tracked by police without a search or bugging warrant authorizing the surveillance Israel police uses NSO’s Pegasus spyware to remotely hack phones of Israeli citizens, control them and extract information from them, Calcalist has revealed. Among those […]

Crypto.com Says ‘Incident’ Was Actually $30 Million Hack

The cryptocurrency platform initially called the hack “an incident.” Photograph: YinYang/Getty Images Crypto.com, one of the largest cryptocurrency exchanges in the world, confirmed that its users got hacked and that the hackers withdrew more than $30 million in cryptocurrency from the wallets of 483 users. The admission comes after the company initially downplayed the hack, […]