How To Prevent Ransomware Attacks More Successfully?
Ransomware is one of the most common cyber threats that attack both companies and private users. It works by encrypting your files,...
SOC Second Defense Phase – Understanding the Cyber Threat Profiles
In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary steps to...
How To Respond Cyber Incident In your Organization
An incident response plan is very essential for any organization to respond to the incident as quickly as possible. Here we have...
Cyber Security is Not an Easy Game for CISO – It’s an Absolute End...
Let’s breakdown the little pieces and the critical dots to connect in the perspective of a CISO and a point-of-view from CyberSpace.
Hackers Launching FlawedAmmyy Malware Via Undetected MS Excel Macros that Carried Powerful Backdoor
Threat actors from TA505 currently spreading powerful FlawedAmmyy RAT via weaponized MS Excel documents with malicious Excel 4.0 macro which is hard...