Since relations between Ukraine and Russia became sour following the Revolution of Dignity in 2014, organizations throughout Ukraine have been subject to recurring cyber-attacks. The wiper malware was used to target specific organizations in the country to disrupt the government's efforts and the economic landscape of the country in order to divert its effort from the front line.
This article is a summary of the #CybersecurityAfterHours event held in January 2022 with blockchain expert Rohas Nagpal. The blockchain network essentially comprises a shared ledger system which is composed of unique addresses, data streams, and a ledger of all transactions between different addresses.
From the Kaseya attack in June to the Log4Shell vulnerability exploits in December, the year 2021 has been victim to some of the most devastating cybersecurity failures of all time. As 2021 comes to an end, we explore rising trends in this article that are likely to materialise in 2022 and leave their impressions for years to come.
Today, a large number of companies use over 1000 cloud-based services, with 21% per cent of the uploaded files containing sensitive data. However, as cloud reliance grows, the increased volume of data on the cloud makes it harder for companies to identify and resolve vulnerabilities. Therefore, to protect data on the cloud it becomes critical for companies to identify what they need to protect and what they need to protect it from. In this article, we discuss the importance of visibility in cyber security, why company data is exposed to risks and how to improve the cyber security posture for data on the cloud.
On the morning of December 9, 2021, the security team at Alibaba Cloud published a vulnerability involving arbitrary code execution involving Log4j, a widely used Java-based logging framework, which allows threat actors to gain complete remote access to web servers and application logs. The vulnerability was dubbed Log4Shell.
As the holiday season approaches, cyber attackers begin preparations, and to counter them, so do cyber security teams. This guide is a great starting point to prepare for the many threats that lie ahead.
This article is a written summary of the third #CybersecurityAfterHours event that happened in September 2021. It discusses Managed Detection and Response, and Threat Hunting, with Ravi Prakash and Chaitanya Kulkarni of LTI.
Several parameters define the success or failure of a good cybersecurity strategy. Ranging from pure statistics to quality of actions, the factors listed in this article can help determine the efficacy of the approach you take to good cyber defense.
This case study analyzes the security environment of a strategic Government entity, and discusses scenarios before and after the deployment of BluSapphire Elite.
The attack landscape is evolving at an unprecedented scale. Zero-day exploits are becoming common. Preventive solutions have to be scalable and be able to be integrated into multiple systems and platforms.
You could be next. If we sum up the entirety of #cybersecurity as a domain, we'd say just that. Shutting down systems isn't the best way to be in business, which is why we need to know more about rapid Incident Response.