Monthly Archives - April 2019

Understanding the cost of a cybersecurity attack: The losses organizations face

The average cost of a cybersecurity attack has been increasing over time. The rewards to hackers in cyberheists have also been increasing, and this has been motivating them to come up with even better tools and techniques in order to allow them to steal more money and data. Several cybersecurity companies have listed their estimates for the average costs [...]

Posted By Category: GeneralComments: 0

Knowing the threat actors behind a cyber attack

This article is an excerpt taken from our latest book Hands-On Cybersecurity for Finance written by  Milad Aslaner and myself. In this book you will learn how to successfully defend your system against common cyber threats, making sure your financial services are a step ahead in terms of security. In this article, you will understand the different types of threat [...]

CARBANAK Source Code Analysis (By Fireeye)

Please be aware this is a repost from FIREEYE. Michael Bailey, James T. Bennett did a great job, which deserves respect. PART 1: PART 2: It is very unusual for FLARE to analyze a prolifically-used, privately-developed backdoor only to later have the source code and operator tools fall into our laps. Yet this is the [...]

Posted By Category: GeneralComments: 0

Cybersecurity: The Beginner’s Guide

Cybersecurity: The Beginner's Guide More than 400 pages of a comprehensive guide to getting started in cyber + 100 pages of advice from Cybersecurity experts. You will find everything to excel your career in Cybersecurity, or help your Organization to close the Cyber Talent Gap. The book is coming soon via @Packt and Amazon Thank you very much for [...]

56 Must Know Data Breach

56 Must Know Data Breach I found this blog post by  Rob Sobers( ) very informative , and I wanted to share it with YOU as well. Data breaches are getting bigger, hackers are getting savvier, and the amount of compromised data is unfortunately on the rise. A quick look at data breach trends shows that hackers are mostly motivated by money to acquire data and that personal information [...]

Posted By Category: GeneralComments: 0