Last time on our blog, we explored what made fileless ransomware so different from other malware and how it might just be the new trend within the hacker community. In this guest blog post, we break down how end-to-end fileless attacks occur. Malware makers are always looking for an edge, a new way to breach corporate networks or compromise personal devices. Ransomware is one popu ...
Three Effective Tips for Achieving a Sound Cybersecurity Policy
In an effort to ensure that every user is safer and more secure online, government and industry have come together to promote cybersecurity awareness each year during the month of October to celebrate National Cyber Security Awareness Month. The National Cyber Security Alliance decides on weekly themes throughout the month and this week’s “Cybersecurity in the Workpla ...
Spam Traps and BlackList Domains and How They Can Affect You
In the world of email marketing, there are protections put in place to keep individuals safe from spam. These protections are easily avoidable with email marketing best practices, but if you get lazy with your list hygiene, or don’t even know better, you can find yourself in trouble. Enter spam traps and blacklists. Spam TrapsSpam traps are usually email addresses that a ...
The Strong Password Paradox
Recently, a 2003 security report that was included in the National Institute of Standards and Technology (NIST) has resurfaced, bringing about an interesting discussion on strong passwords after one of the original writers, dubbed the “originator of web’s password rules” by Slash Gear, has spoken on the matter. The document highlighted the ways in which a secur ...
Web Security Report Now Provided By Cloudbric
Cloudbric was created for users of all backgrounds, with all types of different websites. You might be an IT-security manager with a large enterprise-level site, or just be starting out and wanting to protect your own personal blog. Regardless, knowing what’s going on within your website is important, and that’s why Cloudbric has recently begun providing Web Security Repo ...
The Big Three Questions for Cloud Security
The Cloud is a cost-effective option for many businesses. Businesses can store information and run necessary applications on the cloud and only pay for the resources they expend. Unfortunately, this also means the context of security needs has expanded. Through the sharing of hardware, infrastructure, and perhaps even data storage, security in the cloud has become of significant ...
Can Security Patches Backfire?
There are those that purport that updating your Content Management System (CMS) is one of the most basic practices in securing your website, but what happens when hackers “reverse engineer” security patches? According to CMS Garden, which is part of the Secure Websites and Content Management Systems project funded by the German government, hackers can exploit security pat ...
What Is Fileless Ransomware?
BackgroundRansomware isn’t a new phenomenon. The concept of holding locked files for ransom has been around since the era of the floppy disks. However, many will be surprised to find out that ransomware comes in many forms. Ransomware typically comes in the variants of “locker” ransomware and “MBR” (Master Boot Record) ransomware. Locker ransomware makes a u ...
The Top 10 Hackers Arrested in 2017
Cyber criminals are rampant. Active on the dark web, hacking forums, or other platforms that facilitate illegal activities, hackers are utilizing their skills to run effective but illegal black markets. For example, DDoS-for-hire services are quite popular among cybercriminals with willing customers paying as low as $7 an hour to target a company of their choice. These days, cyber cr ...
Two-Factor vs Multi-Factor Authentication
When the best online security practices are being discussed, there’s always someone that brings up either two-factor authentication (2FA) and multi-factor authentication (MFA). This is because more and more online services are recognizing the need to ensure a higher level of security for online accounts. Two-factor authentication and multi-factor authentication add additiona ...