Blog
Cloud Security: Let's Get Real About What's Actually Working
Ever wonder why 80% of companies still get hit with cloud security incidents despite spending millions on fancy tools? Let's cut through the noise and ask the tough questions about cloud security in 2024.
Ransomware: A Pervasive and Escalating Threat
Ransomware remains the top cybersecurity threat, responsible for 35% of attacks globally between 2020 and 2024. Its evolution is evident in the shift to double extortion, where attackers encrypt data and threaten to leak sensitive information unless the ransom is paid. As a result, businesses must prioritize ransomware defense, focusing on multi-layered security measures.
The Evolution of Cybersecurity from 2020 to 2024
Will GenAI help security professionals reduce their workload, or will it just Generate Another Investment of time and money? If the industry believes that GenAI will help, we need to focus this new tool on reducing the time required to prevent and remediate these attacks.
Embrace the GenAI Revolution with Check Point’s Advanced Security Solutions
The rapid advancement of generative AI (GenAI) is transforming industries by enhancing productivity and enabling innovative applications across various sectors. However, as organizations increasingly adopt these tools, they must also confront the exponential risks associated with them, such as data leakage and regulatory compliance challenges. Check Point’s GenAI Security solution is designed to address these concerns, providing comprehensive visibility, risk assessment, and data protection capabilities tailored to the unique needs of AI-powered environments.
Black Hat 2024: New Finds, Great People, and Fresh Motivation
Attending the Black Hat event in Vegas was an unforgettable experience that left me energized and ready to take on new challenges. Walking through the business hall was a real treat. It was flooded with incredible booths from a giant spider poster that gave me actual chills to grocery store-themed setups that were as clever as they were eye-catching.
Black Hat 2024
I had the opportunity to attend Black Hat 2024, a pivotal event in the cybersecurity calendar. The event drew experts, researchers, and industry leaders to discuss and dissect the latest threats, tools, and innovations. This year, Generative AI emerged as the central theme, reflecting its growing influence on offensive and defensive cybersecurity strategies.
Reverse Engineering: Software and Hardware Used by the Dark Wizards of Hacking
Reverse engineering for me has always been interesting to say the least. One might start learning the basics of a programming language like C or Python, maybe brush up on how memory works with respects to the OS that the program ran on, and finally learn all the tools whether it be hardware or software to access that lower level of programming.
The Latest from Hak5: The Packet Squirrel Mark II
Darren Kitchen grants us another introduction to the world of hacking and cybersecurity with the latest from Hak5: The Packet Squirrel Mark II. Darren Kitchen in the “Hack Across America Van” gives us an existing introduction to the new toolset and features that are offered by the Packet Squirrel Mark II.
Email Hygiene: Looking for Phishing emails in the age of AI
Recently emails have been becoming harder to detect because of AI. However, I wanted to remind everyone that there are still ways to see phishing emails by looking at emails critically in the age of AI phishing tools.
A Monthly Subscription for Hackers: Hacker Boxes
If one is a college student like me, you’re looking for cheap ways of finding retro or current tech at a reasonable price that will not break the bank. Today we’re looking at a HackerBox subscription I have used to work on my computer hardware skills. This is not a sponsored post. I am just talking about something that I want everyone to know about.
Analysis: Cl0p Ransomware
According to the MITRE | ATT&CK framework, “Clop is a ransomware family that was first observed in February 2019 and has been used against retail, transportation and logistics, education, manufacturing, engineering, automotive, energy, financial, aerospace, telecommunications, professional and legal services, healthcare, and high tech industries. Clop is a variant of the CryptoMix ransomware.”
Cyber and Networking Just Changed!
David Bombal talked with Jonathan Davidson and Jeetu Patel at Cisco Live about the tremendous changes in the cybersecurity and networking landscape. Here are the highlights from the discussion:
Flipper Zero: From the beginning to what it's currently being used for
The Flipper Zero has been out for more than two years now. What are people currently using it for? Is it something that should be prevented from purchasing like Amazon and PayPal have done in the past? Or is it a young hacker's first tool to get into cybersecurity?
Veriti: The Single Pane of Glass for Your Company
On a lot of days, IT professionals are told of some new solution that will help them in one select field of IT security. But what tools are out there to manage all the tools you already have? Veriti, a recent exhibitor at RSA 2023, has been making strides in providing full visibility and integration across your entire organization so that you can cut down on management and administrative tasks with your current toolset.
ChatGPT: What Does This Tool Mean for Cybersecurity?
There you are, sitting at your cubicle, wondering how you can copy a set of values that you don’t want to type out in Excel over and over again. You want to look up a quick way but don’t know how to word the question to Google. “Wait, Tim down the hall said some new tool is out that can help with this type of problem, what was it called? Chat-something?”. You text your buddy Tim through the office messaging center, “Hey Tim? What was that tool called you mentioned to me at the breakroom? ChatTPG??”
Level 1: Your First Step into the World of EDR
On our first step into EDR, we venture into the easiest and lowest level of EDR protection for small to medium-sized businesses. We’ll go into more detail about this level of EDR and which companies offer essential EDR protection.
A Spooky Security Month: What to Expect in October for Cyber Security
Welcome to the awareness month for Cyber Security! I am your host Jonah, and we’re going to go through the buzz this month with everything to do with Cyber Security.
What can one do to be aware this month? The guys at CISA tell us to do these “Key Action Steps” To secure ourselves and the people around us!
One Stop Shop for Endpoint Detection
Is your company securing each endpoint?
When I first joined TrustDigital, there were so many different anacronyms that I never knew. This began with learning the Endpoint Solutions landscape. XDR? MDR? EDR? Cortex EDR? How many am I supposed to know and the difference between them?
Put the Packets in the Coconut: HAK5’s Latest Wi-Fi Hacking Tool
Long ago, when pen-testers and hackers needed to scan for Wi-Fi, it was loathed with the number of channels and frequency for Wi-Fi to be scanned. But now, Hak5 has released a new tool to simplify this process, introducing the Wi-Fi Coconut. But before this fantastic piece of technology was brought to life, what did hackers and pentesters do?
HAK5’s Rubber Ducky: Never Again Look at a USB Stick the Same Way
USB sticks, they are all the same. Transfer files via an offline carrier because your internet may be down. Or perhaps you like buying USBs like me cause you need something to boot from when installing Linux, maybe? But what if that harmless-looking USB was the beginning of a company being taken down just because someone asked the front desk to reprint their report due today?