logo
March 18, 2021 | Ryan Brooks

HAFNIUM: Protecting Your Exchange Server from Data Exfiltration

Who is HAFNIUM? In early March, Microsoft reported a large, coordinated attack that exploited critical vulnerabilities in Exchange Server 2010, 2013, 2016 and 2019 in an attempt to exfiltrate credentials and other sensitive information from organizations’ mailboxes. Microsoft attributed this...
October 28, 2020 | Ryan Brooks

What Is Password Spraying, and How Can You Spot and Block Attacks?

In 2019, a data heist at Citrix shook the cybersecurity world. The attackers stole business documents from a shared network drive and from a drive associated with a web-based tool used in Citrix’s consulting practice. The hackers gained this access to Citrix's IT infrastructure through a...
April 4, 2021 | Jeff Melnick

Hybrid Cloud Security

Hybrid cloud is an increasingly popular infrastructure option for companies in industries from game development to finance. But what is it, and what are the most effective hybrid cloud security practices for protecting your sensitive and regulated data? What is hybrid cloud? A hybrid cloud is a...
August 13, 2019 | Brian Johnson

What Are Mousejacking Attacks, and How to Defend Against Them

If you are using a wireless keyboard or mouse on your computer, beware of the risk of getting mousejacked. Using this technique, attackers could take over your entire Active Directory in just minutes using a $15 USB radio device that discovers vulnerable devices. In this podcast, Brian Johnson,...
April 12, 2021 | Kayla Matthews

Top 10 Cyber Attack Maps and How They Can Help You

Cyber attacks are becoming more common and more sophisticated every year, and cybersecurity professionals often find themselves struggling to keep up. Cyber attack maps are a valuable tool that can give them the information they need to stay ahead of attacks. Here are the top ten cyber attack maps...
March 31, 2021 | Jeff Melnick

What Is Elevation of Privilege?

Privilege escalation is a common threat vector for adversaries, which allows them to enter organizations’ IT infrastructure and seek permissions to steal sensitive data, disrupt operations and create backdoors for future attacks. Elevated privileges open doors for attackers to mess with security...
October 8, 2020 | Jeff Melnick

Top 10 Most Common Types of Cyber Attacks

A cyber attack is any type of offensive action that targets computer information systems, infrastructures, computer networks or personal computer devices, using various methods to steal, alter or destroy data or information systems. Handpicked related content: A Vision for Strong...
October 17, 2018 | Cassie Phillips

4 Steps You Should Take If You Have Been Hacked

A data breach can be a disastrous scenario for a small or medium-size business, and even the largest of corporations can be set back months or spend millions recovering from a hack. Minimizing risk and preventing network hacking from happening in the first place should be one of any company’s top...
June 11, 2019 | Jeff Melnick

7 Ransomware Myths Busted

Of today’s cyber security threats, ransomware is a modern scourge. Even though it has made a number of headlines in the past couple of years, ransomware is still surrounded by myths. Dispelling those myths is one of the key factors of developing an effective information security strategy. Here...
July 6, 2020 | Michael Fimin

Top Five Security Trends to Watch

During the last 8 years IT industry hot topics were data governance, network monitoring, threat detection, virtualization, new cost-effective approaches to infrastructure management, backup and disaster recovery solutions and identity governance solutions. However, there’s a new set of IT...
Show more articles
...