SANS – The Five Most Dangerous Cyberattacks
According to SANS Institute Analysts, in today's interconnected world, cybersecurity has never been more critical. The sheer scale of cybercrime today, and the boldness of attackers, is hard for many business leaders to fathom – 450,000 new pieces of malware
DDoS Attacks on Critical Infrastructure: A Look at Hydro-Québec’s Website Outage
Recently, the critical infrastructure of Canada has once again become the target of cyberattacks. Pro-Russian hacking groups have launched a series of DDoS or denial of service attacks, causing operational disruptions and website outages across various government and civilian organizations.
The Indigo Bookstore Ransom Cyber Attack – Lessons Learned
The recent attack on the Indigo Bookstore left many cyber security analysts scratching their heads. How did attackers seize control of systems through ransomware, and how was a zero-day exploit used? It's not just a matter of understanding what happened
Two-Thirds of Organizations Were Hit by a Ransomware Attack Last Year
In SpyCloud’s Ransomware Defense Report, its annual survey of CISOs or Chief Information Security Officers and heads of IT security from Canada, the UK, and US they found that that security teams are starting to lose hope that they can
Malware: Old Tools; New Tricks
Since the earliest form of a computer virus was created in 1949, malware has certainly come of age. Malware continues to wreak havoc on corporate and government entities and remains a perpetual thorn in the side of vendors and IT
How Does the Cyber Mercenary Business Work?
The Cyber Mercenary Business is Surging, Unfortunately Reuters wrote a report on the booming business of Cyber mercenaries which we found particularly interesting and thought it was well worth sharing. The report discusses in detail, various cyber mercenary hacks which have
Ransomware and Business Email Compromise (BEC) Account for 70% of Breaches
Ransomware and business email compromises (BEC) topped the list of the types of attacks on organizations in the past year, making up 70% of the total number, according to the 2022 Unit 42 Incident Response Report from Unit 42 by
What are the Benefits of SOAR Security Technology?
Choosing the Most Effective Security Technology – SIEM versus SOAR In a previous blog post, Why Organizations Are Moving to Managed Firewall and SIEM Solutions, we addressed not only the benefits of Firewall and SIEM security technologies, but also the challenges.
How to Implement an Effective Vulnerability Management Program
We’ve written considerably on Vulnerability Management, Vulnerability Assessments and Patching because they are so critical to preventing attacks. I’ve provided links to several of the most read blog posts we have written on the subject. In this blog post, we’ll
Is an MDR Solution or an MSSP Partnership Better for Your Organization?
In this blog post, we want to analyze the differences between a Managed Detection and Response (MDR) solution and a Managed Security Services Provider (MSSP) partnership and how organizations can differentiate between the two and choose which one or both