How Companies are Successfully Bringing Down the Cost of a Data Breach

January 26, 2021

There is a contentious relationship between budgets and cybersecurity. General consensus has it that bigger budgets equate to better security, but

Lsass Memory Dumps are Stealthier than Ever Before

January 24, 2021

Domain, local usernames, and passwords that are stored in the memory space of a process are named LSASS (Local Security Authority Subsystem Service).

Emotet Malware 2020

January 7, 2021

Emotet, the infamous malware botnet, went silent at the end of October and came back on December 21, 2020. The botnet continues to serve as a platform

What is ATP Security?

January 3, 2021

With the advancement of technology and artificial intelligence in the 21st century, AI applications are being introduced in a myriad of sectors. Parti

Why the Sunburst Malware Was So Unique and What We've Learnt From it

December 28, 2020

The SunBurst trojan was first reported on December 8th, 2020, and has been making headlines ever since. The Sunburst malware is significant both for i

SunBurst Trojan -What You Need to Know

December 16, 2020

On December 8th, the security company FireEye disclosed that it had been breached by an advanced, supposedly nation state-backed, attack group, and as

Cybersecurity Predictions for 2021

December 16, 2020

As originally published in VMblog How is the cybersecurity landscape shaping up for 2021? With the wholesale structural shift to WFH, we provide so

Ryuk Ransomware: The Deviance is in the Variance

November 24, 2020

We have heard this story before, so I will skip the backstory about how ransomware is a giant nightmare that shows absolutely no sign of slowing down,

How to Secure an Android Phone from Hackers

November 19, 2020

Almost 40% of organizations surveyed in a recent Verizon report said they had experienced a mobile-related security compromise. Of those, 66% said the

Zero Day Vulnerability: What it is, and How it works

November 9, 2020

What is a Zero-Day Vulnerability? A zero-day vulnerability is a software flaw that can be potentially abused in different ways, and is unknown to the