The nation-state cyberattack playbook – what comes next?

nation-state playbook

With clashes expanding between Russia and Ukraine, questions are raised as to how far a battle like this can go. In the past warfare used to exclusively mean “boots on the ground”, but today there is a different type of battleground to be fought as well, the battle taking place every hour, of any day […]

Why You Should Care About the Iran Cyber Attack Landscape

Iranian Cyber Attack

Over the last decade, Iran has waged several destructive cyber attacks against governments and private companies, becoming infamous for its deployment of wiper malware as well as its retaliatory attack strategies. As of the end of 2021, in addition to launching attacks on governments and nation-state resources, Iran has been increasing its focus on attacking […]

Assessing Cyber Readiness for 2022

assessing cyber readiness

Assessing your cyber readiness every year is vital to ensuring that your network, applications, and systems have the appropriate protections in place. As we flip the calendar ahead into 2022, performing your cyber assessments is a great way to ring in the new year, along with dropping 15 pounds, hitting the gym 3 times a […]

The Impact of Russian Aggression on Cybersecurity

Russia Attack

With the situation escalating to an invasion, we have already seen these troop movements and aerial bombardments accompanied by cyber attacks on banks and TV stations in Ukraine. For those in the West, the Russian cyber threat is elevated but will be driven largely by the severity of sanctions placed on Russia, as well as […]

China Cyber Threat Defense – Today and in the Months Ahead

china cybersecurity

In 2021, the White House Briefing Room issued a statement attributing malicious cyber activity and threats to the People’s Republic of China. In the statement, China was accused of using “criminal contract hackers to conduct unsanctioned cyber operations globally.” The activities of these Chinese hackers include ransomware attacks, cyber-enabled extortion, crypto-jacking, and theft. One of […]

Everything You Need to Know About Apache Log4J

log4j vulnerability

Update 14th January While the Log4j shell vulnerability surfaced a month ago, it is still being exploited in the wild. Attackers are utilizing it to gain remote code execution (RCE), enabling the deployment of ransomware, crypto miners, and the access of unauthorized systems and data. Exploitation remains simple, allowing attackers to get full control without […]

Proactively Securing Your Enterprise Cloud

cloud security

Somewhere right now, sitting in front of a bank of computer screens in Russia, China, Iran, or even in the United States, is a band of cyber-criminals planning a nation-state grade attack. If they haven’t attacked your network yet, it’s just a matter of time. Taking proactive steps to secure your enterprise cloud now will […]

Weekly Cyber Breakdown

With so much information out there it’s good to know what is top of mind for other industry professionals. We’ll be updating this blog on a weekly basis with the top 10 articles and newsworthy topics in cybersecurity. This is a repository of top trends based on what industry leaders have been discussing most. Think […]

Ransomware: 7 Steps to Take Right Now to Become Ransomware Resilient

fighting ransomware

In our previous blog, we discusses the infamous question of “to pay, or not to pay?” when a network is hit by ransomware. But what about BEFORE the attack happens? In order to do that we need to talk about being ransomware resilient. What does it mean to be resilient? Being resilient means that a […]

Ransomware: To pay or not to pay, that is the question

paying ransomware

State of the ransomware attack. The good, the bad and the ugly… In some ways, the devastating ransomware attacks of the last two years have empowered security officers to obtain the budgets they need to upgrade their organizations’ cybersecurity preparedness and establish more robust security programs to cover people, technology, and procedures. The brazen nation-state […]