Cybersecurity Tools

AI and cyber security: Trends, challenges and future prospects

Yaniv Shechtman has over 15 years of expertise in cyber security, AI, and product management. At Check Point, Yaniv’s primary responsibility is to shape Check Point’s Threat Prevention strategy and technologies, ensuring their products are always ahead of modern attackers, and are able to prevent zero-day threats before anyone else.  In this exclusive CyberTalk interview, Yaniv […]

The post AI and cyber security: Trends, challenges and future prospects appeared first on CyberTalk.

Cybersecurity Tools

Microsoft leads global crackdown against Cobalt Strike, protecting healthcare from ransomware

EXECUTIVE SUMMARY: Microsoft, the Health Information Sharing and Analysis Center (Health-ISAC) and other partners have announced a widespread technical and legal crackdown against servers hosting “cracked” copies of Cobalt Strike; a tool commonly deployed by cyber criminals to distribute malware, including ransomware. The primary goal is to prevent hackers from continuing to use Cobalt Strike […]

The post Microsoft leads global crackdown against Cobalt Strike, protecting healthcare from ransomware appeared first on CyberTalk.

Cybersecurity Tools

Best Patch Management Practices to Follow to Keep Your Business Secured

Patch management is an essential practice for businesses to maintain the security and stability of their IT infrastructure. Patches are released by software vendors to fix vulnerabilities and enhance performance, and failing to manage these patches can lead to security breaches and system failures. In this article, we will be discussing what are the best […]

The post Best Patch Management Practices to Follow to Keep Your Business Secured appeared first on Heimdal Security Blog.

Cybersecurity Tools

Cyber Incident Cripples UK Criminal Records Office

After weeks of silence, the UK’s Criminal Records Office (ACRO) has issued a statement saying that the issues with the website that have been ongoing since January 17 were caused by a “cyber security incident.” ACRO manages criminal record information, conducting checks on individuals as necessary to determine if they have any convictions, cautions, or […]

The post Cyber Incident Cripples UK Criminal Records Office appeared first on Heimdal Security Blog.

Cybersecurity Tools

MSI Breach Claimed By Money Message Ransomware Gang

A recent data breach affecting Taiwanese PC parts maker MSI (Micro-Star International) has been listed on the extortion portal of a new ransomware gang known as ‘Money Message’. The threat actors claim to have stolen source code from the company’s network. MSI is one of the most well-known names in the global hardware market, producing […]

The post MSI Breach Claimed By Money Message Ransomware Gang appeared first on Heimdal Security Blog.

Cybersecurity Tools

What Is a Software Restriction Policy?

In today’s digital age, it is crucial for businesses to protect their sensitive data and computer systems from cyber threats. One effective way of doing so is by implementing a software restriction policy. But what exactly is a software restriction policy? And how can it benefit your organization? In this article, we will explore the […]

The post What Is a Software Restriction Policy? appeared first on Heimdal Security Blog.

Cybersecurity Tools

What is an ‘island hopping’ attack? (and how to stop one)

EXECUTIVE SUMMARY: At the mention of island hopping, you’re likely dreaming about adventures in Hawaii, the Caribbean, or similar destinations with majestic views and white-sand beaches. In the context of cyber security, island hopping refers to a sophisticated type of cyber attack. This technique is used by attackers as a means of circumventing advanced cyber […]

The post What is an ‘island hopping’ attack? (and how to stop one) appeared first on CyberTalk.

Cybersecurity Tools

Designing Your Threat Hunting Framework from Scratch – Core Essentials

A threat hunting framework is a collation of data-driven adversarial scenarios, backed up by hypothetical, field-tested, or time-honored TTPs (i.e., Tactics, Techniques, and Procedures). Serving a wide array of security-wise needs such as baselining, forecasting, threat modeling, vulnerability discovery, and incident response optimization. In this article, we’re going to explore model-based threat hunting, go over […]

The post Designing Your Threat Hunting Framework from Scratch – Core Essentials appeared first on Heimdal Security Blog.

Scroll to Top