Eyal Aharoni

Another Fake Invoice Phishing Scam to the Bin

The fake invoice phishing scam has been around for quite some time and it pops in the wild every once in a while, in a different form. Overall, the nature of all those scams are in the end the same - a clever con to defraud victims.

Will 2018 be the year of critical infrastructure cyberattacks?

For some time now, authorities have been worried that their critical infrastructure will be shut down or severely compromised. Some institutions experience thousands of attempted attacks on a daily basis by hackers, cyber criminals and rival nations. According to the US Department of HLS,[...]

Cyber Security Professionals In High Demand

Professional cybersecurity staff are hard to find - and it only gets worse! For more than a decade, I have been working as a security professional at several companies of various sizes and in different industries. Over the years, I have noticed a worrying trend - lack of skilled security[...]

Cryptojacking - The Latest Cybercrime Play

Following the news, you are quite likely awed by the boost in cryptocurrency, especially Bitcoin has made the (financial) headlines. Founded in 2009, it has risen to levels we have seldom seen before. Needless to say, many other cryptocurrencies jumped on the bandwagon and are now catching up with[...]

United States Cyber Warfare

On Monday December 18, 2017, the White House released a strategy document, calling for stronger defenses against hackers working for criminal enterprises and nations such as Iran, North Korea, China and Russia. In this document, the White House stated that threats targeting cybersecurity pose a[...]

SOX Compliance Now Includes Cybersecurity

SOX Compliance Includes Cybersecurity - Let Cymulate Help You To Navigate The Waters The Sarbanes-Oxley Act (known as SOX) went into effect in 2002 to protect shareholders and the general public from accounting errors and fraudulent practices of organizations. It was also tailored to improve the[...]

Iran’s Growing Role in Cyber warfare

On October 31, Major General Nadav Padan stated at the Reuters Cyber Security Summit that Iran has been launching an increasing number of attacks on Israel. Padan, who heads the IDF’s C4I and Cyber Defense Directorate, added: “Iran has been responsible for many of the thousands of daily[...]

Cyberattacks Are Evolving, and So Does Cybersecurity Technology

Organizations of all shapes and sizes are fighting the war against cyberattackers. As we have seen in recent years, cyberattacks are becoming more and more sophisticated, which makes it harder to detect and mitigate them. As cyberattacks evolve, so does security technology and the security[...]

How to Approach the Demanding 23 NYCRR 500 Regulation

In March 2017, the New York State Department of Financial Services (NYDFS) issued a new regulation, the much discussed 23 NYCRR part 500. Considered to be one of the harshest cybersecurity regulations ever to impact companies, it consists of a new set of standards and requirements for banks,[...]

How Cymulate Assists With ISO 27001 Certification and Compliance

The ISO/IEC 27000 family of standards was developed to help organizations with keeping their information assets secure. Of all the ISO 27000 standards, ISO 27001 is the best-known. It is a specification for an information security management system (ISMS), which is a framework of policies and[...]