On May 6, 2021, CISA released a report about a new ransomware variant dubbed FiveHands, which was...
This blog is about detecting Egregor ransomware. Egregor is the successor to Maze and targets large...
How to hunt PsExec activity and detecting successful exploitation of a newly discovered local...
Emergency security updates have been released for Microsoft Exchange Server. Learn how to detect...
A Sudo privilege escalation vulnerability was hiding under the hood for 10 years. Learn how to...
Threat Intelligence integration in LogPoint SIEM is simple. Learn how to get started with threat...
Behavioral analysis in security uses a big-picture perspective of your environment. Learn more...
GDPR compliance is not optional. Learn the importance of the GDPR - what type of data it protects,...
Emotet is a type of malware created by cybercriminals. Learn more about what it does and how to...
Phishing is a type of fraud used to obtain sensitive details. Learn how to recognize and protect...
CISA stated in their Emergency Directive that SolarWinds Orion code compromise on supply chain...
Cyber security refers to protecting systems connected to the internet from threats in cyberspace....