How hackers use CAPTCHA to evade automated detection
Introduction CAPTCHA seems to be everywhere we look. These sloppy characters are on blogs, ticket websites, shopping portals — you name it. Those cars you need to spot in a block of images before you can access a website? That’s CAPTCHA too. CAPTCHA was invented to help sites distinguish human ... Read More
The State of Ransomware 2020: Key findings from Sophos & Malwarebytes
Introduction Ransomware has become one of the most common and well-known threats to cybersecurity. 2020 saw a notable increase in ransomware attacks specifically on enterprise entities, as many organizations found themselves in the crosshairs of malicious actors. These attacks are becoming increasingly complex, as cybercriminals leverage new and sophisticated techniques ... Read More
Top 5 ways ransomware is delivered and deployed
Introduction If your computer has not yet been affected by ransomware, odds are it could soon be. With ransom payments averaging more than $80,000 in Q4 2019, the coveted malicious software is fast... Go on to the site to read the full article ... Read More
How to spot a malicious browser extension
Introduction Let’s not kid ourselves — the experience of surfing the web wouldn’t be the same without extensions. Browser extensions make it possible to block advertisements, change the appearance of... Go on to the site to read the full article ... Read More
6 Windows event log IDs to monitor now
Introduction It’s possible to use Windows 10 event logs to detect intrusions and malicious activity, but some knowledge of critical IDs is mandatory to avoid over-collection and other issues. This... Go on to the site to read the full article ... Read More
21 cybersecurity products to combat APT29: MITRE weighs in
Introduction MITRE, a not-for-profit organization based in the US, is best known for its globally accessible knowledge base of cyber adversary strategies and techniques popularly referred to as the... Go on to the site to read the full article ... Read More
RTS Threshold Configuration for Improved Wireless Network Performance [Updated 2020]
In a scenario where a lot of users connect to a wireless network and where they occasionally lose their connections, an individual or a company can tweak the wireless router’s advanced settings to... Go on to the site to read the full article ... Read More
Top 8 cybersecurity books for incident responders in 2020
Introduction Are you passionate about incident response? Do you want to build upon your knowledge of how to mitigate cyberthreats? If yes, then you’d love the nuggets of wisdom these cybersecurity... Go on to the site to read the full article ... Read More
How to identify and prevent firmware vulnerabilities
Introduction As creators of computer software begin to take security vulnerabilities more seriously, hackers are increasingly targeting the lower ends of the computer stack in hopes of stealing... Go on to the site to read the full article ... Read More
Vishing spikes as workforces go remote: 6 vishing prevention tips anyone can follow
Introduction With thousands of teams worldwide being asked to work remotely to help contain the spread of COVID-19, scammers have a fertile ground to prey upon telecommuters. One scam that workers... Go on to the site to read the full article ... Read More