Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyberattacks

5 most common mobile phishing tactics

Phishing is one of the things that keeps CISOs up at night. Phishing attacks are effective and simple to launch, and used by financially motivated attackers as well as more targeted attacks. In the case of a targeted attack, it may harvest login credentials to gain access to corporate or personal resources. In fact, sometimes corporate access can be used to steal personal data, and vice versa.

COVID-19 sets the stage for cyberattacks: How to protect your business while working remotely

Businesses are shifting their operations to a remote work model in the midst of the COVID-19 lockdown. While this enables business to generally continue as normal, there has also been a rise in cyberattacks because of this shift as reported by national cybersecurity agency CERT-In. Security experts have also predicted a 30-40 percent hike in cyberattacks due to increased remote working.

Can incident response be fun?

Cyber attacks are unfortunately inevitable. It’s important to security harden your networks as much as possible. But your organization must also be prepared for incident response. Effective incident response involves an awareness of various cyber risks and threats, having a plan to respond to the various ways they manifest, and having a team that can think quick on their feet when they actually occur.

How Do DDOS Attacks Work?

DDoS attacks are considered as one of the most popular cyber-attacks and they have the ability to make systems go down for a very long time. Read more to learn how they work and how you can stop them. What is a DDoS attack? DDoS attack (also known as the distributed denial of service attack) is a dangerous and common type of cyber-attacks. It aims to overwhelm the target through disrupting the regular traffic of a service, network or a server.

Hunting COVID Themed Attacks With IOCs

This blog post is part twenty-four of the "Hunting with Splunk: The Basics" series. I've been dealing with viruses for years, but this is the first time I've written a blog post where we are dealing with actual viruses. Ever since the 2004 tsunami, I have witnessed cyber-baddies using current events to trick users into opening documents or clicking on links. The COVID-19 breakout is no different.

Common focal points of DoS attacks

This blog was written by an independent guest blogger. Is your company at risk of a Denial of Service (DoS) attack? If so, which areas are particularly vulnerable? Think it’s a crazy question? Think again. In 2020, 16 DDoS attacks take place every minute. DoS attacks require fewer resources, and so pose an even greater threat. In this post, we’ll discuss what a DoS attack is and how it differs from a Distributed Denial of Service (DDoS) attack.

Coronavirus Impact on Cyber Security

The Coronavirus (COVID-19) pandemic is increasing tremendously and disrupting the global health at large extent, in addition to the damages to economics, social and political systems. More importantly, the digital world is also on the verge of destruction because, due to this menace, the people at large scale are compelled to work remotely and doing so will make them rely heavily on remote communication and digital tools.

Attackers Taking Advantage of the Coronavirus/COVID-19 Outbreak

Following the latest developments of the emergence of the novel coronavirus disease 2019 (COVID-19) which has brought disruptive changes in our daily lives and chaos throughout the three-sector economic model – primary (raw materials), secondary (manufacturing), tertiary (services), unfortunately we are observing an increasing risk on cybersecurity threats related to COVID-19.

What is a Smurf Attack?

A smurf attack is a type of DDos attack that aims to create high traffic on your network and harm your organization. Read more to learn how you can avoid such attacks. What is a smurf attack? A smurf attack is a type of DDoS attack that consumes the essential resources of your network through the utilization of ICMP Echo mechanism. In other words, an attacker tries to flood a server with ICMP packets in order to render it inaccessible.

How to harden your employees from the massive social engineering threat

Social engineering is the art of human deception. In the world of cybersecurity, it’s how to fool human beings in order to conduct cyber attacks. Some of these cyber attacks can be very expensive to your business! In fact, many of the worst cyber attacks to your organization’s network start with fooling you or one of your employees. Penetrating a network without human interaction is really tough.