How To’s: Your go-to when in doubt
No more jargons. We break down cybersecurity using plain language. Explore our living library of manuals, useful links, and practical articles that help you become more confident in your security practices.
Learn how to quickly get the hang of ATTACK Simulator
You might have trouble getting started with ATTACK Simulator. Don’t worry, it’s ok, we’re here to help. Find out:
- How to get started
- How to create your first simulation
- How to whitelist
- How to understand reports
Denmark’s Central Bank compromised for 7 months by Russian hackers
Russian attackers accessed Denmark's central bank network with the use of a hidden malware. This granted them access to the institution's systems for seven months without being noticed. U.S. attributed the illicit operation to the Russian Foreign Intelligence Service,...
Ransomware: 6 essential aspects
Although they have been around since as early as 1989, ransomware attacks have gained traction in the last years, causing great financial harm to both companies and people. But what makes this threat so special? Well, the term "ransom" must ring a bell as to what it...
Microsoft accidentally signed a gaming driver containing rootkit malware
Microsoft signed a driver being distributed in the gaming field, a malicious network filter rootkit. The driver is called “Netfilter,” a rootkit that redirects traffic to Chinese C2 IPs and aims to spoof gamers’ geo-locations to deceive the system and play from...
Akamai reported pandemic-bored scammers attacking the gaming industry in 2020
Cyberattacks on the video game industry increased during the pandemic year, shooting 340%, showing Akamai’s gaming report from 2020. Who is Akamai Technologies? Akamai Technologies Inc. is a global content delivery network (CDN), cloud service, and cybersecurity...
If it seems fishy, it might be a phishing attack
If something online seems too good to be true, it usually isn't. Phishing is one of those things that masquerade as legit and trustworthy to get a hold of your money, the kind of play-pretend I would call "phisy." The bigger the company, the more complicated the...
8 types of Indicators of Compromise (IoCs) and how to recognize them
With the help of the Indicators of Compromise, you and your team can identify malicious activity or security threats, such as data breaches, insider threats, or malware attacks. Therefore, security breaches can take different forms: unknown files on the system,...
No more “Son, how do I…?” Find your answers here
Computer security can be an intimidating subject. We prepared a few guides to get you started.
- Introduction to Antivirus Solutions
- Introduction to VPNs
- Security when working from home
Denmark’s Central Bank compromised for 7 months by Russian hackers
Russian attackers accessed Denmark's central bank network with the use of a hidden malware. This granted them access to the institution's systems for seven months without being noticed. U.S. attributed the illicit operation to the Russian Foreign Intelligence Service,...
Ransomware: 6 essential aspects
Although they have been around since as early as 1989, ransomware attacks have gained traction in the last years, causing great financial harm to both companies and people. But what makes this threat so special? Well, the term "ransom" must ring a bell as to what it...
Microsoft accidentally signed a gaming driver containing rootkit malware
Microsoft signed a driver being distributed in the gaming field, a malicious network filter rootkit. The driver is called “Netfilter,” a rootkit that redirects traffic to Chinese C2 IPs and aims to spoof gamers’ geo-locations to deceive the system and play from...
Akamai reported pandemic-bored scammers attacking the gaming industry in 2020
Cyberattacks on the video game industry increased during the pandemic year, shooting 340%, showing Akamai’s gaming report from 2020. Who is Akamai Technologies? Akamai Technologies Inc. is a global content delivery network (CDN), cloud service, and cybersecurity...
If it seems fishy, it might be a phishing attack
If something online seems too good to be true, it usually isn't. Phishing is one of those things that masquerade as legit and trustworthy to get a hold of your money, the kind of play-pretend I would call "phisy." The bigger the company, the more complicated the...
8 types of Indicators of Compromise (IoCs) and how to recognize them
With the help of the Indicators of Compromise, you and your team can identify malicious activity or security threats, such as data breaches, insider threats, or malware attacks. Therefore, security breaches can take different forms: unknown files on the system,...