Featured Blogs
Are Virtual Machines the New Gold for Cyber Criminals?
Introduction Virtualization technology has been an IT cornerstone for organization for years now. It revolutionized the way organizations can scale...
Give CISOs a Shot – They Deserve It
Imagine this scenario: a CEO, CIO, CTO, CISO walk into a bar… The CTO has heard about cocktails that go...
Through Your Mind’s Eye: How to Address Biases in Cybersecurity – Part 2
In Part 1 of our Through Your Mind’s Eye series, we explored how our brains don’t give each decision we...
Through Your Mind’s Eye: What Biases Are Impacting Your Security Posture?
Cybersecurity and biases are not topics typically discussed together. However, we all have biases that shape who we are and,...
Scammers Impersonating Windows Defender to Push Malicious Windows Apps
Summary points: Scammers are increasingly using Windows Push Notifications to impersonate legitimate alerts Recent campaigns pose as a Windows Defender...
DarkSide Ransomware Victims Sold Short
Over the past week we have seen a considerable body of work focusing on DarkSide, the ransomware responsible for the...
Major HTTP Vulnerability in Windows Could Lead to Wormable Exploit
Today, Microsoft released a highly critical vulnerability (CVE-2021-31166) in its web server http.sys. This product is a Windows-only HTTP server...
“Fool’s Gold”: Questionable Vaccines, Bogus Results, and Forged Cards
Preface Countries all over the world are racing to achieve so-called herd immunity against COVID-19 by vaccinating their populations. From...
Defending Cybersecurity Can’t Be Done Blindfolded–The EU’s NIS2 Review Can Set This Right
Cybercriminals are currently enjoying a golden age, with the volume and severity of attacks growing constantly, and an ability to...
Roaming Mantis Amplifies Smishing Campaign with OS-Specific Android Malware
The Roaming Mantis smishing campaign has been impersonating a logistics company to steal SMS messages and contact lists from Asian...