
When you hear the word “malware,” what is your first thought? Probably something along the lines of a complicated computer virus, something that you don’t want. Malware is short for…
When you hear the word “malware,” what is your first thought? Probably something along the lines of a complicated computer virus, something that you don’t want. Malware is short for…
As cybercrime becomes more prevalent, international governing bodies and individual governments have set standards for cybersecurity in companies that handle their customers’ data. I’ve previously talked about the FTC and…
How does the Recovery function benefit the affected organization if they do it well? According to publicly available data, a company can lose 6.5% of its customer base in the…
What can we learn from Real-Life Examples? Retail giants Target and Home Depot are two notorious examples of large-scale cyber-attacks. In both cases, tens of millions of credit cards were…
Who is the Target? In my previous article on NotPetya, I talked about other targets of the attack, the consequences, and who we think is behind NotPetya. This post will…
What is NotPetya? Last time I talked about the backstory of NotPetya, a string of malicious code born from an NSA catalog of software exploits. In this post, I will…
In Light of Covid19 Before I start our newest series I wanted to write a quick note in regards to what is happening all around us. It probably feels like…
I’m going to answer this question with a question: Did you know there are at least five high-profile cyber battles that have already happened that you can study? Stuxnet –…