Category: Uncategorized
-
Incident Response Plan
Due to the ever-changing threat that cybersecurity poses, any organization is at risk of being a victim of a cyber-attack. This means a company risks their reputation, revenue, and their client’s trust if they do not have the proper security measures in place to prevent their data from being compromised. An Incident Response Plan (IRP) is a set of tools and… Read more
-
REvil Was Behind JBS Cyberattack
JBS the world’s largest meat processing company based in Brazil, has fallen victim to a Russian-speaking gang, REvil. They have made some of the largest ransomware demands on record. The attack targeted servers supporting JBS’s operation in North America and Australia. Backup servers weren’t affected and the company stated that it is not aware of… Read more
-
Ransomware Attacks
Within the past year, several known threat actors have been actively employing ransomware by exploiting vulnerabilities to cause massive disruptions in major industries and gain huge monetary value. According to Cybersecurity and Infrastructure Security Agency (CISA), Ransomware is an ever-evolving form of malware designed to encrypt files on a device, rendering any files and the systems that… Read more
-
Working from home is here to stay
Working from home is here to stay. One of many things made clear by the Covid-19 pandemic was that working from home can save businesses money and many employees prefer it. This new work from home culture has allowed a much bigger threat vector for businesses. Drive-By wireless attacks will continue to grow and be… Read more
-
Working Remotely: Preventing Disaster
Working Remotely: Preventing Disaster Following the start of the COVID-19 pandemic, working remotely has become increasingly popular in many organizations. A policy that was once meant to be only temporary, has been taking rapid steps towards permanence due to the promotion of increased productivity and an improved work-life balance. While this has many benefits for the organization and employees,… Read more
-
DarkSide Ransomware Gang Extorted $90 Million from Several Victims in 9 Months
DarkSide Ransomware Gang Extorted $90 Million from Several Victims in 9 Months The hacker group behind the Colonial Pipeline ransomware attack, DarkSide that went in operation in August 2020, received $90 million in bitcoin payments after a 9 month ransomware spree. DarkSide is just one of the many groups that operated as a service provider… Read more
-
Defending Against Ransomware
Defending Against Ransomware Ransomware is a rapidly growing threat affecting numerous private companies and government agencies. Ransomware can encrypt files on a device rendering them usable until a ransom is paid in exchange for its depiction. Any given attack could cost thousands to millions of dollars in loss of capabilities, recovering data, or repairing system… Read more
-
Implications for new Cyber Security Executive Order
In the wake of the Colonial pipeline breach, there are big changes coming to our industry. As many of you many know, this week the White House released a comprehensive Executive Order (EO) that charts a new path forward with regard to standardization of cyber security best practices across government and private industry in the… Read more
-
Reverse Shells
Reverse Shells When discussing reverse shells, we should first cover what a shell is. A shell allows a user to interact with an operating system, the applications on the computer, and every function that is allowed for that user. A remote shell allows a user to perform actions on a device across the network. A remote shell works… Read more
-
What is Web Application Pen Testing? How is it done?
What is Web Application Pen Testing? How is it done? Web Application Pen Testing is done to find vulnerabilities in the web application using different types of Pen Testing tools, which are later exploited by an attacker. According to SiteLock data, websites experience an average of 22 attacks per day. Most common vulnerabilities that are exploited are Cross Site Scripting (XSS), Broken Access Control and even Security Misconfigurations. The… Read more