2020 Verizon Data Breach Investigations Report: Summary and key findings for security professionals

| | General Security
Introduction The Verizon Data Breach Investigations Report, or the Verizon Data Breach Report, is an annual report intended for information security professionals. It summarizes 3,950 confirmed data breaches and is a collection of work from 81 contributors spanning 81 countries and has grown more than a little bit since last ... Read More

Microsoft Azure job outlook

Introduction The business world is relocating to the cloud and the trend is strong. It has been predicted that by the end of 2020, 83% of all businesses will be in the cloud and by 2021, the percentage of workloads processed in cloud data centers will reach 94%. By 2022, ... Read More

Cost of non-compliance: 8 largest data breach fines and penalties

| | General Security
Introduction Different regulations and laws will slap organizations with fines and penalties for data breaches. This is because the organization did not take the privacy of their data seriously. However, the authorities take this responsibility very seriously and will not hesitate to punish with fines and penalties that are sometimes ... Read More

How to avoid getting locked out of your own account with multi-factor authentication

| | Security Awareness
Multi-factor authentication (MFA) is one of the most popular authentication security solutions available to organizations today. It really comes as no surprise, as the multi-factor authentication benefits of enhanced security go beyond the basic password security measures by forcing the user to authenticate with another method that (presumably) only the ... Read More

Fake STOP/DJVU decryptor malware: What it is, how it works and how to prevent it

| | Malware Analysis
Introduction Imagine a situation where criminals steal access to your property. They offer you a seemingly valid solution in the way of a tool that will give you your access back. But you use that solution and yet you still do not have access? Welcome to the nightmarish world of ... Read More

Tycoon malware: What it is, how it works and how to prevent it | Malware spotlight

| | Malware Analysis
Introduction It has been said that a picture is worth a thousand words. In the world of malware, a picture is worth an infection — in other words, a picture can actually be the malware (ransomware,... Go on to the site to read the full article ... Read More

Purple Fox malware: What it is, how it works and how to prevent it

| | Malware Analysis
Introduction Without question, there has been a marked die-off in the usage of Exploit Kits (EK). The Purple Fox exploit kit is a type of malware that is defying this recent trend and has had some... Go on to the site to read the full article ... Read More

Top 6 cybersecurity books for IT auditors

| | General Security
Introduction Like many other information security professionals, you probably have a library of books on the topic of your career choice. Not only that, but like many others, yours is probably not as... Go on to the site to read the full article ... Read More

Zeus Sphinx: What it is, how it works and how to prevent it | Malware spotlight

| | Malware Analysis
Introduction When something is described as “rising from the ashes,” the mythological creature known as the phoenix normally comes to mind. For those that research malware, they may soon want to swap... Go on to the site to read the full article ... Read More

How to detect and prevent web shells: New guidance from the NSA and the Australian government

| | Malware Analysis
Introduction It’s not every day that governments of different countries draft guidance rules about any subject together. It is even rarer that they create joint guidance for cybersecurity reasons. It... Go on to the site to read the full article ... Read More