Blog Holding your data hostage Header Compressor

Holding Your Data Hostage: Ransomware in 2019

You might have had this nightmare or heard about this horror story on the news: Your loved one is ...
Blog Threatmodeling Header Compressor 2

Threat Modeling: Is it worth the hype? Only if you want to be proactive.

In security, our biggest battle is getting ahead of the next security incident. Each incident ...
Blog Sports Industry Header Compressor

Protect This House: Cyber Threats to Sports Organizations in 2019

Sports organizations and franchises have security measures in place to protect their athletes on ...
Follow the Money

Follow the Money: Cyber Threats to Financial Services (Part Two)

In this week’s installment of the Follow the Money series, we explore the most common attack ...
Follow the Money

Follow the Money: Threat Actors in the Financial Services Landscape (Part One)

As in most criminal enterprises, the objective is to make money. It is only natural for cyber ...
Email

Watch Your BEC This Tax Season

Raise your hand if you have ever received an email from an executive at your company, seemingly out ...
man at computer

Three Common Threat Actors and the One You Might Not Know About

We’ve all heard stories of espionage, mafia crime, and lone wolf attackers throughout history. ...
Saving Lives, Losing Data

Saving Lives, Losing Data: Data Breaches in Healthcare

As patient care and health records become digitalized, protecting the healthcare industry is more ...
ScoutThreat

Zero-Day Vulnerabilities: An Inside Look at Luxor2008

When it comes to breaches, we have seen this time and again: an exploited vulnerability that costs ...
CV of Cybercriminal

The CV of a Cybercriminal

What is more attractive than an undetectable, money-making, remote access malware to a ...