IT Security Information
Get regular updates on current threats such as ransomware, phishing, CEO fraud and business email compromise.
What Are Insider Threats? Definition, Types, and Mitigation Tactics
What Is an Insider Threat?An insider threat is like a wolf in sheep’s clothing. Outwardly, they appear just like any other trusted member of your enterprise, but inside, they have the potential and agenda to destroy whole infrastructures or manipulate data for their...
Bypassing Authentication A Comprehensive Guide to Pass-the-Hash Attacks
No, this guide does not relate to any sort of attack on potato hash or anything to do with the passing of other versions of hash. This is a brief peek behind the curtain on how a hacker might exploit your account to gain privileged access to your environment with a...
Boosting Safety Through Cyber Threat Intelligence to Secure Your Digital Space
In an age where the digital landscape is continually evolving, businesses and individuals alike face increasing threats from a myriad of cyber adversaries. To navigate these challenges, there has been a growing emphasis on the value of threat intelligence in the...
Advanced Threat Protection for Evolving Email Threats
Email Security – The State of PlayOn Monday morning, James in marketing at YOLO Pty Ltd sees an enticing email on his phone from a vendor that he does a lot of business with. It talks about the upcoming soccer finals being held in his city and offers two tickets for...
Detecting and Preventing Password Spraying Attacks
Passwords are common ways of logging into the system, service, or application. They are typically used in combination with usernames to confirm user identity and gain access to target systems. Even though many of us know passwords should be strong and frequently...
Understanding the Adversary-in-the-Middle Attack – How It Works and How to Defend Against It
What Is an Adversary-in-the-Middle Attack?An adversary-in-the-middle attack (formerly Man-in-the-middle, sometimes now referred to as Attacker-in-the-middle) is a type of cyber attack in which an attacker intercepts and relays messages between two parties who believe...
Mastering and Leveraging the MITRE ATT&CK Framework on Cyber Threat Detection
History of MITRE ATTACK Framework The requirement to track and catalog typical TTPs (Tactics, Techniques, and Procedures) that APT (Advanced Persistent Threat) organizations used against business Windows networks was first addressed by MITRE in 2013. FMX (Fort Meade...
Malware vs. Viruses: Understanding the Threat Landscape
There is a misconception about what malware and viruses are. Many people use it interchangeably, however, they are two different things. Malware is any malicious software that has a goal to harm someone's data or systems. The virus is just a type of malware. In this...