Blog
Protecting Against ESXi Ransomware Attacks – VMs in Danger
Extortion is about leverage. The greater the leverage, the greater the propensity of the victim to open their coffers and pay the ransom. Initially, ransomware attacks focused on blocking access to an organization’s critical data by encrypting it. This simple yet effective model had a key weakness: a robust backup system could restore the encrypted…
-
GhostLocker RaaS Operations Growing as Recruiters Search for Cash Flow
Remember when hacktivism felt like a rebellious punk rock anthem raging against the affluent corporate machine? Hacktivists flitted through cyberspace as digital Robin Hoods fueled by righteous indignation or online warriors with a penchant for mischief. Those days are about as ancient as dial-up internet. Today, the cybercrime scene is a cutthroat business. A new…
-
Protecting Against ESXi Ransomware Attacks – VMs in Danger
Extortion is about leverage. The greater the leverage, the greater the propensity of the victim to open their coffers and pay the ransom. Initially, ransomware attacks focused on blocking access to an organization’s critical data by encrypting it. This simple yet effective model had a key weakness: a robust backup system could restore the encrypted…
-
Retail’s Double-Edged Sword: Acceleration, Vulnerability, and Cybersecurity
The retail industry has experienced a seismic shift in recent years, instigated by the COVID-19 pandemic and fueled by other industries rapidly digitizing their organizations. Adapting their businesses to e-commerce models was a lifeline for many retailers, but it also came at a cost: the broader the attack surface, the greater the vulnerability. Retail is…
-
Preventing Man-in-the-Middle Attacks by Safeguarding Your Network and Identifying Vulnerabilities
Have you ever received a package that appeared to have been opened before it reached you, and upon opening it, found that some items were missing? Have you used your credit card for a purchase, only to discover a week later that your statement showed several unauthorized charges? These scenarios are classic examples of unauthorized…
-
Bolstering Your Cyber Armor: The Key Steps in Vulnerability Remediation
After nearly a decade of relatively stable numbers, there was a dramatic spike in newly discovered common vulnerabilities and exposures (CVEs), going from just under 6,500 in 2016 to over 14,700 in 2017. Since then, the number has only grown exponentially. HackerOne’s ethical hackers identified a whopping 65,000 vulnerabilities last year. According to those hackers, the rapid pace…
-
The OSINT Impact on Modern Cybersecurity Practices
Think about the thousands of artifacts and clues that a team of archeologists excavate and examine to construct a coherent narrative of past civilizations. Each artifact serves as a clue that provides a snippet of insight into how the people of that time lived. Digging up small artifacts in this matter is still being conducted…