blog_hero_02

Blog

Leveraging Cyber Simulation for M&A
Eyal Aharoni, May 21, 2018
Read More >
Why Cybersecurity Is Critical for a Successful M&A In its “Cybersecurity Is Critical to the M&A Due Diligence Process” research note, Gartner points out that the M&A process is complicated by the inability to integrate and manage the cybersecurity practices of both companies. As part of the due diligence process, the acquiring company needs to examine the cybersecurity history and policies of the organization that it wants to acquire very carefully, as illustrated by the takeover of Yahoo by.
Read More >
Dark Web Shopping Center
Eyal Aharoni, May 8, 2018
Read More >
Black Mirror – Looking at the dark web marketplace for cybercrime We all know about cybercriminals, but do we also understand where they get their tools of the trade? Let’s go the dark side and have look at the black mirror reality of the cybercrime marketplace. The cybercrime world is the counterpart of our world. The same way that we use the (visible) web, they use the dark web which has its own search engines such as Onion.to. We purchase books from Amazon, items from Alibaba and fashion.
Read More >
SMBs - The Cybercrook’s Favorite Snack
Eyal Aharoni, April 30, 2018
Read More >
Cybercrooks just love going after small and medium-sized businesses since they are more vulnerable to cyberattacks than large organizations that have cybersecurity teams and top-notch security solutions in place. This makes those smaller organizations not only more vulnerable, but attacking them also does not require sophisticated tactics or tools, a simple bot botnet, RaaS toolkit (Ransomware as a Service) or phishing kits can already do the trick. Let’s have a closer look at the three main.
Read More >
Still Phishing in Troubled Waters
Eyal Aharoni, April 23, 2018
Read More >
You might think that we have become good at identifying phishing attacks today, but that’s a dangerous assumption. The frightening truth is, that around 90% of all cyberattacks start with a phishing or spear phishing email. Yes, almost all of us can spot a dubious request from a “Nigerian prince” asking us for our bank details a mile away, but phishers have improved their game to keep on outsmarting us. With the US tax season in full gear, cybercrooks are sending phishing emails to get.
Read More >
The US is Fighting in the Cyber Trenches
Eyal Aharoni, April 12, 2018
Read More >
Yes, the US is under cyberattacks - constantly Being a rich superpower comes with a price, as the US found out the hard  way. Especially American healthcare and financial organizations remain popular targets, since they are rich pickings for cybercrooks. Infrastructure is another favorite, as are municipalities which have often outdated cyber defenses. Looking back, 2017 which was a peak year with 1.57B data breaches and close to 179M data records exposed (Source: Statistica). Although it’s.
Read More >
SOC Enhancement With Cymulate KPI
Eyal Aharoni, April 8, 2018
Read More >
Risk Score KPI Lets Your SOC Rock Your Cybersecurity In the good old days, a security operations center (SOC) was basically a room full of live camera feeds to let the organization see what’s going and to take action if necessary. It started with government agencies, defense departments, followed by financial institutions. Today, is also used for managed services. Its purpose is still the same - being a centralized hub for continuously monitoring of and managing the security status of an.
Read More >
Is Your Organization GDPR Ready?
Eyal Aharoni, April 4, 2018
Read More >
On May 25, 2018, the EU General Data Protection Regulation will come into force. GDPR is the brainchild of ENISA (the European Union Agency for Network and Information Security) to stem the increasing number of reported data breaches, especially those relating to online systems and services. In our blog of August 31 last year, we explained the various articles and implications of the new legislation. Organization have not been idle and are moving rapidly from GDPR awareness to GDPR compliance.
Read More >
Your Own Red Army
Eyal Aharoni, March 25, 2018
Read More >
Don’t See Red - Opt for an Automated Red Team to Test Your Security Defenses For some time now, companies have copied a proven military concept to test their cybersecurity. This concept is simple: A Red Team consisting of cybersecurity pros attacking the organization’s network and the Blue Team must stop these attacks. Organizations normally have their Blue Team (IT manager, cybersecurity staff etc.) in place, but when it comes to the Red Team, it’s complicated. To test the organization’s.
Read More >
Game of Ransomware
Eyal Aharoni, March 15, 2018
Read More >
The Four Horsemen of The Ransomware Apocalypse Keep Riding On Optimistic souls predicted last year that ransomware attacks had their heyday in 2017, so that we would see a decline in 2018. Bad news - this is not the case…The four horsemen of the ransomware apocalypse keep on riding, just changing their targets, tools, methods and tactics. The motive for ransomware remains the same: money. (A noted exception is the NotPetya ransomware attack which was aimed at paralyzing a nation’s economic.
Read More >
Cyber Slingshot Away!
Eyal Aharoni, March 13, 2018
Read More >
Coming to a router near you - beware of Slingshot malware! Cybercrooks and cyberspooks never sleep, and their new “creations” keep popping up. One of the recent trends is targeting routers to cyberattack. Recently, the routers of Latvian manufacturer MikroTik were attacked in a highly sophisticated manner. The malware dubbed “Slingshot”, infected at least 100 computers worldwide. Using a multi-layered attack, the malware spies on PCs. Similar to the advanced backdoor Trojan Regin (which.
Read More >
Show

Subscribe to Our Blog

Stay up to date with the latest cybersecurity news and tips

By Tag