Tag: Threats

Datto SIRIS Ransomware Detection Screenshot
April 13, 2022

What Is Agent Tesla Spyware and How Does It Work?

Ofir Yaakobi

Agent Tesla is an extremely popular spyware Trojan written for the .NET framework that has been observed since 2014 with many iterations since then.

Read Now
March 31, 2022

What Is Email Spoofing and How to Protect Against It?

Rotem Shemesh

Email spoofing is a technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust.

Read Now
March 23, 2022

What is Nvidia RTX-LHR v2 Unlocker and How Does it Work?

Maor Dahan

On February 22, the crypto mining community received a massive fake news alert that claimed to successfully unlock the Nvidia LHR mining prevention feature. This was later reported as malware and is what we refer to as community phishing.

Read Now
March 03, 2022

Conti Ransomware – How it Works and 4 Ways to Protect Yourself

Ofir Yaakobi

With a robust defense and response plan for Conti ransomware, you can ensure users, clients, and your organization are protected against Conti and other ransomware attacks.

Read Now
March 01, 2022

Dealing with DarkSide

Elizabeth Fichtner

How to deal with DarkSide – a group that packages and provides ransomware capabilities as a service

Read Now
Datto SIRIS Ransomware Detection Screenshot
February 24, 2022

Recent Increase in Wiper Malware Attacks – MSPs Heed Warnings

Ryan Weeks

In the wake of recent international events, the world is facing elevated threats of cybersecurity breaches.

Read Now

Using Sender Policy Framework to Mitigate Spoofing

Tulsie Narine

What is Sender Policy Framework (SPF) and how exactly does the protocol work?

Read Now

Log4J Exploit Detection (CVE-2021-44228)

Elizabeth Fichtner

CVE-2021-44228 – how to easily detect if your web server has been exploited and infected.

Read Now
February 14, 2022

7 Risks Posed by Open-Source Software and How to Defend Yourself

Elizabeth Fichtner

Knowing the risks posed by open-source software — going into the development process — will help you avoid pitfalls associated with sharing crowd-sourced code.

Read Now