Dark Web Shopping Center

Black Mirror – Looking at the dark web marketplace for cybercrime We all know about cybercriminals, but do we also understand where they get their tools of the trade? Let’s go the dark side and have look at the black mirror reality of the cybercrime marketplace.

SMBs - The Cybercrook’s Favorite Snack

Cybercrooks just love going after small and medium-sized businesses since they are more vulnerable to cyberattacks than large organizations that have cybersecurity teams and top-notch security solutions in place. This makes those smaller organizations not only more vulnerable, but attacking them[...]

Still Phishing in Troubled Waters

You might think that we have become good at identifying phishing attacks today, but that’s a dangerous assumption. The frightening truth is, that around 90% of all cyberattacks start with a phishing or spear phishing email.

The US is Fighting in the Cyber Trenches

Yes, the US is under cyberattacks - constantly Being a rich superpower comes with a price, as the US found out the hard  way. Especially American healthcare and financial organizations remain popular targets, since they are rich pickings for cybercrooks. Infrastructure is another favorite, as are[...]

SOC Enhancement With Cymulate KPI

Risk Score KPI Lets Your SOC Rock Your Cybersecurity In the good old days, a security operations center (SOC) was basically a room full of live camera feeds to let the organization see what’s going and to take action if necessary. It started with government agencies, defense departments, followed[...]

Is Your Organization GDPR Ready?

On May 25, 2018, the EU General Data Protection Regulation will come into force. GDPR is the brainchild of ENISA (the European Union Agency for Network and Information Security) to stem the increasing number of reported data breaches, especially those relating to online systems and services. In our[...]

Your Own Red Army

Don’t See Red - Opt for an Automated Red Team to Test Your Security Defenses For some time now, companies have copied a proven military concept to test their cybersecurity. This concept is simple: A Red Team consisting of cybersecurity pros attacking the organization’s network and the Blue Team[...]

Game of Ransomware

The Four Horsemen of The Ransomware Apocalypse Keep Riding On Optimistic souls predicted last year that ransomware attacks had their heyday in 2017, so that we would see a decline in 2018. Bad news - this is not the case…The four horsemen of the ransomware apocalypse keep on riding, just changing[...]

Cyber Slingshot Away!

Coming to a router near you - beware of Slingshot malware! Cybercrooks and cyberspooks never sleep, and their new “creations” keep popping up. One of the recent trends is targeting routers to cyberattack. Recently, the routers of Latvian manufacturer MikroTik were attacked in a highly sophisticated[...]

Tidal Waves in The Cybercrime Ocean

The Rising Costs of Cybercrime - Guess Who Pays The Ferryman? Over the last few years, cybercrime and espionage have caused damages that have reached $600 billion in 2017, which is about 0.8% of global GDP. This is a substantial increase from $445 billion in damages that was reported in 2014. Guess[...]