EDR

WHY EDR SOLUTION IS BETTER THAN ANTIVIRUS ?

WHY EDR SOLUTION IS BETTER THAN ANTIVIRUS Let's start first with the definition of EDR or Endpoint Detection and Response. It is an endpoint security solution that monitors end-user devices to detect and respond to cyber threats, it also  records and stores endpoint-system-level behaviors (logs), uses...

Train your Threat Hunting Skills

Train your Threat Hunting Skills One of my best friends, my partner in conferences, books, family friend Milad Aslaner wrote a great PowerShell simulation which can help you train your Threat Hunting skills. The good news is its completley FREE , below are the details and...
Free Internet Security Threat Report

Free Internet Security Threat Report by Symantec 2019

Free Internet Security Threat Report Formjacking. Targeted Attacks. Living off the Land. Coming for Your Business. Symantec’s 2019 Internet Security Threat Report takes a deep dive into insights from the world’s largest civilian global intelligence network, revealing: Formjacking attacks skyrocketed, with an average of 4,800 websites compromised each...

Virus Bulletin : Lazarus Group a mahjong game played with different sets 0f tiles

Lazarus Group a mahjong game played with different sets of tiles Please go ahead and click the link below to read the full article .  Below is a summary for the ones who want see what's in the article : https://www.virusbulletin.com/virusbulletin/2019/06/vb2018-paper-lazarus-group-mahjong-game-played-different-sets-tiles/#ref25 The number of incidents attributed to the...
Does Apple spy on iPhone ?

Apple and Privacy

Apple and Privacy Does really Apple cares about your privacy, as they advertise heavily or is this what they want us to believe? Compared to Google and Facebook they are by far better in terms of privacy as of today! But are they really angels? Or do...
Data Breach

Verizon Data Breach Investigations Report 2019

Verizon Data Breach Investigations Report Understanding the threats can help you manage risk effectively. The threats are real, the attackers motivated. But something standsbetween them and your organization's data: you and your securityteams, with the insight, perspective, and tools to take action. You'll find that all  right...
vulnerability

Acunetix Web Application Vulnerability Report 2019 – Free download

Acunetix compiles an annual web application vulnerability report in order to provide security experts and interested parties with an analysis of data on vulnerabilities gathered over the previous year. The 2019 report contains the results and analysis of vulnerabilities, detected from the automated web and network...

Why researching IT Security?

Why researching IT Security There is nearly every week an IT Security incident, more and more corporations and individuals are getting hit by Cyber Criminals. Based on commercial Kaspersky Security Bulletin (Kaspersky Security Bulletin, 2017) and Symantec Security report (Symantec Internet Security Threat Report ) the number of IT-related attacks are increasing...
Data Breach

Microsoft Security Intelligence Report (SIR) v18

Volume 18 of the Microsoft Security Intelligence Report (SIR) is now available. The Microsoft Security Intelligence Report (SIR) analyzes the threat landscape of exploits, vulnerabilities, and malware using data from Internet services and over 600 million computers worldwide. Threat awareness can help you protect...