CISO’s guide to choosing an automated security questionnaire platform

In this day and age of cyber risk and data privacy regulations, automated third-party questionnaires are a must. Organizations can no longer simply hire vendors without proof of a strong cyber posture, and a comprehensive questionnaire can demonstrate … Continue reading CISO’s guide to choosing an automated security questionnaire platform

Webinar – Getting Inside the Mind of an Attacker: TLS Attacks and Pitfalls

Transport Layer Security (TLS) is a common cybersecurity protocol that is frequently seen in email, web browsers, messaging, and other communication methods that take place over networks. TLS is relied upon to ensure secrecy using different techniques … Continue reading Webinar – Getting Inside the Mind of an Attacker: TLS Attacks and Pitfalls

A Malware Researcher’s Guide to Reversing Maze Ransomware

At the end of May 2019, a new family of ransomware called Maze emerged into the gaping void left by the demise of the GandCrab ransomware. Unlike run-of-the-mill commercial ransomware, Maze authors implemented a data theft mechanism to exfiltrate infor… Continue reading A Malware Researcher’s Guide to Reversing Maze Ransomware

Webinar: You don’t get a pass on cybersecurity during a crisis

In this webinar, Mark Sangster discusses how the COVID-19 crisis is affecting businesses and individuals and the need to stay vigilant. Emerging threats from bad actors who are taking advantage of the COVID-19 crisis are inevitable. Distributed workfor… Continue reading Webinar: You don’t get a pass on cybersecurity during a crisis

New TrickBot Module Bruteforces RDP Connections, Targets Select Telecommunication Services in US and Hong Kong

Bitdefender researchers have discovered a new TrickBot module (rdpScanDll) built for RDP bruteforcing operations on select targets. The new module was discovered on January 30 and, based on the IP addresses it targets, victims seem to be US and Hong Ko… Continue reading New TrickBot Module Bruteforces RDP Connections, Targets Select Telecommunication Services in US and Hong Kong

Guide: Supplier CCPA readiness for security and IT teams

It’s important for security and IT professionals to understand how the California Consumer Privacy Act (CCPA) will affect how they do their jobs. Businesses that fail to comply with CCPA could face penalties of up to $7,500 per violation and individual… Continue reading Guide: Supplier CCPA readiness for security and IT teams