What is Threat Hunting in cybersecurity domain

Threat hunting is the practice of detecting cyber threats lurking in the digit networks. Suppose you have heard of companies’ data being breached for not discovering the attackers’ position. In that case, threat hunting can be the process they require to identify those security incidents before the breach occurs. To be successful with threat hunting,… Continue reading What is Threat Hunting in cybersecurity domain

Multinational Restaurant Chain Data Breach – Things You Should Know

Blog Over 18 Cr orders, details from a popular multinational restaurant chain are exposed on the dark web. Surprisingly, the breached data includes all the details related to the customer orders, including the names, email addresses, mobile numbers, real-time locations, and much more. How to prevent such high-impact data breaches? SISA’s cybersecurity tips for your… Continue reading Multinational Restaurant Chain Data Breach – Things You Should Know

Published
Categorized as Blogs

Nagios XI Security Vulnerabilities Exploited to Run Cryptomining Malware

Blog 11 security vulnerabilities have been discovered in Nagios in the past 5 months. The miscreants have exploited the network monitoring software to run crypto-mining malware, resulting in an average score of 7.8. While Nagios had 22 vulnerabilities in 2020, the average CVE base score has increased by 1.04 in 2021. Threat actors have been… Continue reading Nagios XI Security Vulnerabilities Exploited to Run Cryptomining Malware

Published
Categorized as Blogs

MITRE ATT&CK Framework: All you need to know

Blog Many organizations may prioritize tracking specific adversary group behaviors that they know are of particular threat to their industry or vertical. The ATT&CK framework by MITRE continues to evolve as threats emerge and excogitate. The MITRE ATT&CK framework being a useful source for classifying threats and organization’s risk, gives defenders & red teamers common… Continue reading MITRE ATT&CK Framework: All you need to know

Published
Categorized as Blogs

Data Discovery for Securing Sensitive Data on the Cloud

Blog As organizations seek to expand their data footprint on the cloud, many executives responsible for data security and risk are encountering a challenge they have not had to navigate earlier: discovering sensitive data on the cloud. In fact, it is the security of sensitive information that most executives are worried about when it comes… Continue reading Data Discovery for Securing Sensitive Data on the Cloud

5 Reasons Why You Should Pursue CPISI 2.0 Certification

Protecting payment data has become one of the most critical roles of cybersecurity teams, and the need for professionals with payment security skills is far outpacing the number of qualified individuals. Companies looking out for skilled people to help them comply to emerging regulations in the payment security field is making it a career choice… Continue reading 5 Reasons Why You Should Pursue CPISI 2.0 Certification

Published
Categorized as Blogs

5 Most Common Application Vulnerabilities and How to Mitigate Them

Blog Sometimes you don’t know what you don’t know, but the good news is that there is guidance for organizations who wish to find the vulnerabilities in their applications before the attacker does. In response to escalating cybersecurity attacks, we pioneered the forensic practice in 2010. In our work helping organizations secure their applications across… Continue reading 5 Most Common Application Vulnerabilities and How to Mitigate Them

Published
Categorized as Blogs

Zeoticus 2.0 Ransomware – All You Need to Know

Blog The Zeoticus 2.0 ransomware can execute payloads offline without any C2 (Command & Control) connectivity. The new version of Zeoticus ransomware has adopted rapid encryption algorithms for both symmetric and asymmetric sides. With the Zeoticus 2.0 ransomware even more top-of-mind, businesses are taking preventive steps to mitigate any risks. But incident response and threat… Continue reading Zeoticus 2.0 Ransomware – All You Need to Know

Published
Categorized as Blogs

Nefilim Ransomware

Blog Countless news reports have documented the outbreak of Nefilim ransomware and many organizations across a range of industries have been affected by the ransomware’s attacks. In this article we have summarized the root causes of Nefilim ransomware and ways to prevent it. A Covid-19 vaccine trial was bogged down in recent weeks when researchers… Continue reading Nefilim Ransomware

Published
Categorized as Blogs
SISA’s Latest
close slider

Webinar

Infosec Report

The current query has no posts. Please make sure you have published items matching your query.