General

Knowing the threat actors behind a cyber attack

This article is an excerpt taken from our latest book Hands-On Cybersecurity for Finance written by  Milad Aslaner and myself. In this book you will learn how to successfully defend your system against common cyber threats, making sure your financial services are a step ahead in terms of security. In this article, you will understand the different types of threat [...]


CARBANAK Source Code Analysis (By Fireeye)

Please be aware this is a repost from FIREEYE. Michael Bailey, James T. Bennett did a great job, which deserves respect. PART 1: https://www.fireeye.com/blog/threat-research/2019/04/carbanak-week-part-one-a-rare-occurrence.html PART 2: https://www.fireeye.com/blog/threat-research/2019/04/carbanak-week-part-two-continuing-source-code-analysis.html It is very unusual for FLARE to analyze a prolifically-used, privately-developed backdoor only to later have the source code and operator tools fall into our laps. Yet this is the [...]


Posted By Category: GeneralComments: 0

56 Must Know Data Breach

56 Must Know Data Breach I found this blog post by  Rob Sobers( https://www.varonis.com/blog/data-breach-statistics/ ) very informative , and I wanted to share it with YOU as well. Data breaches are getting bigger, hackers are getting savvier, and the amount of compromised data is unfortunately on the rise. A quick look at data breach trends shows that hackers are mostly motivated by money to acquire data and that personal information [...]


Posted By Category: GeneralComments: 0

Cybersecurity: The Beginner’s Guide

Do you want to have a career in Cybersecurity? Do you want some guidance on how to switch to cyber? Then this book is right for you, where you will learn everything you need to start your Cyber career from the authors as well as Industry experts like Ann Johnson, Robin Wright, Yuri Diogenes, Dr. Ivica Simonoski, Onur Ceren, [...]


Posted By Category: GeneralComments: 0

IT Security Policy

The essence of an IT security policy is to establish guidelines and standards for accessing the organization's information and application systems. As IT infrastructures have become more complex and organization's resources have become more distributed, the need for improved [...]


Posted By Category: GeneralComments: 0