Small-STATE-OF-BREACH-PROTECTION-2020-1024x537
20 Jan 2020 • Yiftach Keshet

The State of Breach Protection 2020 | Global Survey and Industry Report

What are the key considerations security decision makers should take into account when designing their 2020 breach protection? To answer […]

20 Jan 2020 • Yiftach Keshet

The State of Breach Protection 2020 | Global Survey and Industry Report

Small-STATE-OF-BREACH-PROTECTION-2020-1024x537

What are the key considerations security decision makers should take into account when designing their 2020 breach protection? To answer […]

23
14 Jan 2020 • Cynet SOC: Max Malyutin, Haim Nahmani and Itamar Meydoni

Ransomware Attacks in Belgium - Analysis & Protection

There are reports lately on a wave of ransomware attacks targeting organizations in Belgium. While the damage this wave inflicts […]

14 Jan 2020 • Cynet SOC: Max Malyutin, Haim Nahmani and Itamar Meydoni

Ransomware Attacks in Belgium - Analysis & Protection

23

There are reports lately on a wave of ransomware attacks targeting organizations in Belgium. While the damage this wave inflicts […]

33
02 Jan 2020 • Yiftach Keshet

EternalBlue: The Lethal Nation-State Exploit Tool Gone Wild

There’s a good chance you’ve heard of EternalBlue, the infamous exploit responsible for a slew of high-profile cyber attacks since […]

02 Jan 2020 • Yiftach Keshet

EternalBlue: The Lethal Nation-State Exploit Tool Gone Wild

33

There’s a good chance you’ve heard of EternalBlue, the infamous exploit responsible for a slew of high-profile cyber attacks since […]

4
22 Dec 2019 • Yiftach Keshet

Botnet Attacks: Transforming Your IT Resources into an Army of Zombies

One computer program that automatically performs a repetitive malicious task is called a bot. Multiply that program by two or […]

22 Dec 2019 • Yiftach Keshet

Botnet Attacks: Transforming Your IT Resources into an Army of Zombies

4

One computer program that automatically performs a repetitive malicious task is called a bot. Multiply that program by two or […]

384
11 Dec 2019 • Yiftach Keshet

Download 2020 Cybersecurity Salary Survey Results

The 2020 Cybersecurity Salary Survey was an online survey published to gain insight into the details related to cybersecurity compensation. […]

11 Dec 2019 • Yiftach Keshet

Download 2020 Cybersecurity Salary Survey Results

384

The 2020 Cybersecurity Salary Survey was an online survey published to gain insight into the details related to cybersecurity compensation. […]

334
14 Nov 2019 • Yiftach Keshet

Cryptominers: The Silent Leeches Draining Your Computing Resources

Today, we’re surrounded by an endless supply of devices, all with some amount of computing power. Cryptominer malware harnesses this […]

14 Nov 2019 • Yiftach Keshet

Cryptominers: The Silent Leeches Draining Your Computing Resources

334

Today, we’re surrounded by an endless supply of devices, all with some amount of computing power. Cryptominer malware harnesses this […]

blog-384-207
07 Nov 2019 • Yiftach Keshet

Exploit Kits: Their Evolution, Trends and Impact

What Are Exploit Kits? Exploit kits are a type of all-inclusive, automated, and rapidly deployable threat. These threats often target […]

07 Nov 2019 • Yiftach Keshet

Exploit Kits: Their Evolution, Trends and Impact

blog-384-207

What Are Exploit Kits? Exploit kits are a type of all-inclusive, automated, and rapidly deployable threat. These threats often target […]

331
24 Oct 2019 • Yiftach Keshet

The 7 Best Free and Open-Source Incident Response Tools

What Is Incident Response? Being prepared is key to responding to security incidents in an accurate and level-headed manner. When […]

24 Oct 2019 • Yiftach Keshet

The 7 Best Free and Open-Source Incident Response Tools

331

What Is Incident Response? Being prepared is key to responding to security incidents in an accurate and level-headed manner. When […]

33
03 Oct 2019 • Yiftach Keshet

6 Incident Response Steps for Effective Security Event Mitigation

Like any other emergency situation, security incidents require swift, coordinated action. But operating in a systematic manner when your company’s […]

03 Oct 2019 • Yiftach Keshet

6 Incident Response Steps for Effective Security Event Mitigation

33

Like any other emergency situation, security incidents require swift, coordinated action. But operating in a systematic manner when your company’s […]