Spear Phishing Understand, Analyze and Prevent

July 29, 2018

Phishing is a social engineering technique that aims to deceive people into unknowingly providing their personal financial information or other type of credentials to cybercriminals. A phishing attack is most often initiated with a type of unsolicited email that prompts the user to click on a link with the purpose of misleading users into what appears to be a legitimate website.

Spotlight

Strong Future International

(Strong Future International) Marketing Group was launched in 1998. Starting with just one product, sold only in the United States, SFI has now grown to more than 100' 000 products and services (and growing daily) sold in more than 200 countries around the world. SFI was created to allow anyone with a computer and Internet access the opportunity to tap into the worldwide e-commerce revolution. Anyone of legal age in his or her country can become an SFI affiliate for free by filling out an online registration form. There is no obligation or purchase requirements of any kind.

OTHER WHITEPAPERS
news image

NMS Security Architecture Considerations & Approaches

whitePaper | August 26, 2022

The SolarWinds compromise became public in December 2020 and was a massive wake up to the industry. Likely a state-sponsored attack, it compromised potentially thousands of governments and other high-profile organisations across the globe. Many organisations are currently in damage control following the breach. Many of them are unsure if the perpetrators have entered, spread and are still persistent within their environment - even after they shut down the SolarWinds Platforms.

Read More
news image

Security Operations Maturity Model

whitePaper | February 20, 2020

As the threat landscape continues to evolve, your cybersecurity efforts must follow suit. With your security operations center (SOC) at the core of your offense against threats, you must ensure that it can handle anything that comes its way. To be effective, you need to mature your SOC to stop threats early — before damage occurs. Whether your SOC is a virtual team of two to three or a 24x7 operation, maturing your security operations capabilities will help you achieve a faster mean time to detect (MTTD) and mean time to respond (MTTR) to cyberthreats. This white paper explores LogRhythm’s Security Operations Maturity Model (SOMM), which explains how to measure the effectiveness of your security operations. Through the model, you can learn how to mature your security operations capabilities, improving your resilience to cyberthreats.

Read More
news image

Cross-Generational Security Of Mobile Telephony

whitePaper | August 4, 2022

Abstract— With the recent roll-outs of 5G networks and the rise of phones supporting the standard, it’s critical to examine the technical underpinnings of 5G system security. The fifth generation of 3GPP (3rd Generation Partnership Project) mobile telephony, the lack of understanding, outright hostility, and general confusion surrounding this roll-out is unmatched in the history of mobility. We aim to alleviate much of the confusion and hostility by providing an overarching description and security document.

Read More
news image

Ransomware: How to prevent, predict, detect & respond

whitePaper | January 9, 2020

The malicious programs known as ransomware have attracted a significant amount of coverage in the mainstream media over the last few years, as major companies and organizations announced that their operations had been affected by the threat. Examples of affected businesses include hospitals, universities and major international corporations [2, 3]. Despite the alarming nature of the threat, the way ransomware gains entry onto a user’s device is actually no different from the methods used by other threats. Ransomware is most commonly spread by two methods.

Read More
news image

ScienceLogic Global Security

whitePaper | September 30, 2022

As organizations become more digital in nature, securing the data becomes a top-of-mind priority given the cybersecurity challenges. ScienceLogic is committed to making the necessary investments in security and providing the transparency to gain the trust of our customer and partners.

Read More
news image

How to Prepare For & Respond to Ransomware in Operational Technology Environments

whitePaper | March 14, 2023

Targeted intrusions for gaining long-term access and collecting data about industrial control systems (ICS) are becoming much more frequent. Many of these attacks are about understanding the network and preparing for future activities without causing any immediate impact. The most recent Dragos Year in Review6 report shows that the ransomware groups Lockbit 2.0 and Conti were responsible for more than half of the observed ransomware attacks in industrial environments in 2021, and that these instances resulted in actions on objectives. These attacks have been observed in almost every industrial vertical, primarily targeting small to medium-sized organizations in manufacturing.

Read More

Spotlight

Strong Future International

(Strong Future International) Marketing Group was launched in 1998. Starting with just one product, sold only in the United States, SFI has now grown to more than 100' 000 products and services (and growing daily) sold in more than 200 countries around the world. SFI was created to allow anyone with a computer and Internet access the opportunity to tap into the worldwide e-commerce revolution. Anyone of legal age in his or her country can become an SFI affiliate for free by filling out an online registration form. There is no obligation or purchase requirements of any kind.

Events