A curious parallel can be drawn between cybercriminals and the intriguing phenomenon of Cicadas. Akin to the periodic insects that emerge from the ground after years of dormancy, cybercriminals often resurface with renewed vigor, unleashing their disruptive activities...
How to Use Microsoft SMB for OS Detection
The Study of Different Approaches from 4 Well-Known Vendors You may wonder “how does a blackbox...
Stop HelloKitty and PrintNightmare with RidgeBot
In the cyberworld, HelloKitty is not a cute kitten. And PrintNightmare is an actual nightmare....
Recently discovered Zimbra vulnerabilities may have compromised 200,000 companies
Zimbra, an open-source collaborative office suite, consisting of webmail, web document creation...
Supply Chain Attacks: Potential for Profit Multipliers
On July 2nd, what’s considered the biggest ransomware incident to date paralyzed Kaseya and up to...
Recovery from Ransomware – Jack’s Story Part II
Last week, we introduced to you Jack -- an experienced IT veteran -- and began the story of how,...
Ransomware is By Your Side Just like COVID
This is a true story. April 26, 2021: just a regular Monday morning during the year of a global...