FAQ
FAQ – What are YARA Rules?
YARA is a pattern matching framework. It is used to identify and classify malware and other IT Security threats. It has a long standing history in the IT security landscape…
Read moreWhat is the Difference Between Attack Surface Management & Vulnerability Management
With how quickly software and businesses evolve, this causes problems with the traditional IT asset and vulnerability management practices. As a result this has opened a new technological segment known…
Read moreWhat is Confidential Computing?
What is Confidential Computing? Confidential computing is an approach which takes advantage of secure enclave technology. This in turn enables the creation of a trusted execution environment (TEE) based on…
Read moreHow to Mitigate Malicious OneNote Attacks and the Indicators of Compromise
This post is a continuation of the other post, Malicious One Note Files are Being Used in Attempts to Gain Initial Access to Victim’s Networks, which shows how a malicious…
Read moreWho Is The Cl0p Ransomware Group?
The Cl0p ransomware gang is a notorious cyber criminal gang that is known for deploying ransomware attacks. They are associated with the deployment of sophisticated ransomware attacks. These attacks involve…
Read moreWindows 11 Security Tips, Keeping You Safe
In this post we will look at some basic security mechanisms that you can use to help keep you safe from online threats. General Security Tips Be careful when connecting…
Read moreWhat is Data Privacy and Why is Data Privacy Important?
Data Privacy Defined Data privacy is the ability for one to control how, what, and where our personal or confidential information is gathered, stored or shared. This was important way…
Read moreHow to Prevent a Cyber Attack
An organization is never 100% safe from a cyber attack. The more you education your employees on what to be vigilant for and how to practice creating secure passwords, the…
Read moreHow to Create a Strong Secure Password & How to Keep Your Password Safe?
In this day and age the internet is an integral part of our lives. Everything we do can be found online from banking to healthcare and can be found on…
Read moreWho are Lace Tempest?
The on going attack of Progress Software MOVEit Transfer applications has been attributed by Microsoft to Lace Tempest. The Microsoft threat intelligence team has been quoted as follows: "Exploitation is…
Read more