How the Dutch police scammed the Deadbolt ransomware gang
The Dutch police recently recovered 155 decryption keys from victims of the DeadBolt ransomware gang, revealing the hackers' creativity while...
Over 18 years experience in technology evangelizing & solution sales with a deep understanding of B2B(2C) SaaS solutions & technology trends.
I help clients get a better grip on their cyber security through XRATOR's SaaS platform. I consult, guide and support my customers to get better visibility on their cyber risk, and provide them with the tools to make compliance a breeze.
The Dutch police recently recovered 155 decryption keys from victims of the DeadBolt ransomware gang, revealing the hackers' creativity while...
Today, in light of the growing number of cybercrimes and the sophistication of cyberattackers, companies are eager to purchase miracle...
Security Operations Centers (SOC) are evolving from monitoring and responding to threats to identifying risks and collaborating with partners to...
OWASP Top 10 is an industry-standard risk assessment standard for web applications. It helps identify potential security risks and controls...
During regular threat hunting activities, Kaspersky identified malicious Tor Browser installers. According to their telemetry, all the victims targeted...
With strengthening regulation and a constant rise of cyber attacks, more and more organization turn to external specialized company to...
Recently, threat actor leverage MFA fatigue to breach into Uber, Microsoft and Cisco. The cybercrime gang Lapsus$ is very keen...
On July 13th, 2022, Emotet suddenly stopped spamming in what appears to be a move to protect its victims. It...
Running a suspicious document or opening a file whose source you don't know is always risky. However, there is a...
An organization's cybersecurity requires people to collaborate and to understand and respond to legal, economic, political and technological frameworks. There...
"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.
XRATOR® – copyright 2020-2021
© 2018 JNews by Jegtheme.