Thursday, January 27, 2022

Russia’s takedown of REvil explained

It was recently revealed that Russian authorities had dismantled notorious ransomware as a service (RaaS) group REvil via a series of raids and arrests. What...

Cybersecurity News week ending 16 Jan 2022 ~ Network Tigers

Cybersecurity news provided by NetworkTigers on Monday, 17 January 2022. SAN MATEO, CA — CISA and FBI issue joint cybersecurity advisory pertaining to Russian cyber threats, Ukraine under...

Common network security monitoring tools

Network security monitoring tools help protect digital assets, including network traffic, while also preventing and responding to unauthorized network intrusion. The progressive nature of...

Zero Trust: What it is and why it matters

Cybercrime, phishing attempts, and security hacks are all on the rise worldwide. These data breaches can be costly to businesses and individuals. They leech...

Whats popular?

Russia’s takedown of REvil explained

It was recently revealed that Russian authorities had dismantled notorious ransomware as a service (RaaS) group REvil via a series of raids and arrests. What...

Cybersecurity News week ending 16 Jan 2022 ~ Network Tigers

Cybersecurity news provided by NetworkTigers on Monday, 17 January 2022. SAN MATEO, CA — CISA and FBI issue joint cybersecurity advisory pertaining to Russian cyber threats, Ukraine under...

Common network security monitoring tools

Network security monitoring tools help protect digital assets, including network traffic, while also preventing and responding to unauthorized network intrusion. The progressive nature of...

Zero Trust: What it is and why it matters

Cybercrime, phishing attempts, and security hacks are all on the rise worldwide. These data breaches can be costly to businesses and individuals. They leech...

Cybersecurity News week ending 9 Jan 2022 ~ NetworkTigers

Cybersecurity news provided by NetworkTigers on Monday, 10 January 2022. SAN MATEO, CA — Attackers attempt hacks by mailing USB drives, new Java vulnerability similar to Log4Shell, New...

Was Facebook hacked on 4 October 2021?

If you opened your computer, phone or laptop and saw that social media giant Facebook no longer existed, how would you feel? For some,...

What are the effects of the Kronos ransomware attack?

The December 11th ransomware attack levied against Ultimate Kronos Group (UKG), commonly simply referred to as “Kronos,” has left organizations, businesses and individuals to...

Cybersecurity News week ending 2 Jan 2022 ~ NetworkTigers

Cybersecurity news provided by NetworkTigers on Monday, 3 January 2022. SAN MATEO, CA — Hacker group uses Log4Shell in attempted university attack, Apache releases new Log4j update, cyberattack...

Must businesses accept cyberattacks as the new normal?

“There are two types of companies: those who have been hacked, and those who don’t yet know that they have been hacked.”  These grim words...

Ransomware in 2022: what can we expect?

Ransomware will likely continue to evolve and increase in complexity through 2022 and beyond. It has played a huge role in the increase of...

Russia’s takedown of REvil explained

It was recently revealed that Russian authorities had dismantled notorious ransomware as a service (RaaS) group REvil via a series of raids and arrests. What...

Cybersecurity News week ending 16 Jan 2022 ~ Network Tigers

Cybersecurity news provided by NetworkTigers on Monday, 17 January 2022. SAN MATEO, CA — CISA and FBI issue joint cybersecurity advisory pertaining to Russian cyber threats, Ukraine under...

Common network security monitoring tools

Network security monitoring tools help protect digital assets, including network traffic, while also preventing and responding to unauthorized network intrusion. The progressive nature of...

Zero Trust: What it is and why it matters

Cybercrime, phishing attempts, and security hacks are all on the rise worldwide. These data breaches can be costly to businesses and individuals. They leech...

Cybersecurity News week ending 9 Jan 2022 ~ NetworkTigers

Cybersecurity news provided by NetworkTigers on Monday, 10 January 2022. SAN MATEO, CA — Attackers attempt hacks by mailing USB drives, new Java vulnerability similar to Log4Shell, New...

Was Facebook hacked on 4 October 2021?

If you opened your computer, phone or laptop and saw that social media giant Facebook no longer existed, how would you feel? For some,...

What are the effects of the Kronos ransomware attack?

The December 11th ransomware attack levied against Ultimate Kronos Group (UKG), commonly simply referred to as “Kronos,” has left organizations, businesses and individuals to...

Cybersecurity News week ending 2 Jan 2022 ~ NetworkTigers

Cybersecurity news provided by NetworkTigers on Monday, 3 January 2022. SAN MATEO, CA — Hacker group uses Log4Shell in attempted university attack, Apache releases new Log4j update, cyberattack...

Must businesses accept cyberattacks as the new normal?

“There are two types of companies: those who have been hacked, and those who don’t yet know that they have been hacked.”  These grim words...

Ransomware in 2022: what can we expect?

Ransomware will likely continue to evolve and increase in complexity through 2022 and beyond. It has played a huge role in the increase of...

Russia’s takedown of REvil explained

It was recently revealed that Russian authorities had dismantled notorious ransomware as a service (RaaS) group REvil via a series of raids and arrests. What...

Cybersecurity News week ending 16 Jan 2022 ~ Network Tigers

Cybersecurity news provided by NetworkTigers on Monday, 17 January 2022. SAN MATEO, CA — CISA and FBI issue joint cybersecurity advisory pertaining to Russian cyber threats, Ukraine under...

Common network security monitoring tools

Network security monitoring tools help protect digital assets, including network traffic, while also preventing and responding to unauthorized network intrusion. The progressive nature of...

Zero Trust: What it is and why it matters

Cybercrime, phishing attempts, and security hacks are all on the rise worldwide. These data breaches can be costly to businesses and individuals. They leech...

Cybersecurity News week ending 9 Jan 2022 ~ NetworkTigers

Cybersecurity news provided by NetworkTigers on Monday, 10 January 2022. SAN MATEO, CA — Attackers attempt hacks by mailing USB drives, new Java vulnerability similar to Log4Shell, New...

Was Facebook hacked on 4 October 2021?

If you opened your computer, phone or laptop and saw that social media giant Facebook no longer existed, how would you feel? For some,...

What are the effects of the Kronos ransomware attack?

The December 11th ransomware attack levied against Ultimate Kronos Group (UKG), commonly simply referred to as “Kronos,” has left organizations, businesses and individuals to...

Cybersecurity News week ending 2 Jan 2022 ~ NetworkTigers

Cybersecurity news provided by NetworkTigers on Monday, 3 January 2022. SAN MATEO, CA — Hacker group uses Log4Shell in attempted university attack, Apache releases new Log4j update, cyberattack...

Must businesses accept cyberattacks as the new normal?

“There are two types of companies: those who have been hacked, and those who don’t yet know that they have been hacked.”  These grim words...

Ransomware in 2022: what can we expect?

Ransomware will likely continue to evolve and increase in complexity through 2022 and beyond. It has played a huge role in the increase of...

Russia’s takedown of REvil explained

It was recently revealed that Russian authorities had dismantled notorious ransomware as a service (RaaS) group REvil via a series of raids and arrests. What...

Cybersecurity News week ending 16 Jan 2022 ~ Network Tigers

Cybersecurity news provided by NetworkTigers on Monday, 17 January 2022. SAN MATEO, CA — CISA and FBI issue joint cybersecurity advisory pertaining to Russian cyber threats, Ukraine under...

Common network security monitoring tools

Network security monitoring tools help protect digital assets, including network traffic, while also preventing and responding to unauthorized network intrusion. The progressive nature of...

Zero Trust: What it is and why it matters

Cybercrime, phishing attempts, and security hacks are all on the rise worldwide. These data breaches can be costly to businesses and individuals. They leech...

Cybersecurity News week ending 9 Jan 2022 ~ NetworkTigers

Cybersecurity news provided by NetworkTigers on Monday, 10 January 2022. SAN MATEO, CA — Attackers attempt hacks by mailing USB drives, new Java vulnerability similar to Log4Shell, New...

Was Facebook hacked on 4 October 2021?

If you opened your computer, phone or laptop and saw that social media giant Facebook no longer existed, how would you feel? For some,...

What are the effects of the Kronos ransomware attack?

The December 11th ransomware attack levied against Ultimate Kronos Group (UKG), commonly simply referred to as “Kronos,” has left organizations, businesses and individuals to...

Cybersecurity News week ending 2 Jan 2022 ~ NetworkTigers

Cybersecurity news provided by NetworkTigers on Monday, 3 January 2022. SAN MATEO, CA — Hacker group uses Log4Shell in attempted university attack, Apache releases new Log4j update, cyberattack...

Must businesses accept cyberattacks as the new normal?

“There are two types of companies: those who have been hacked, and those who don’t yet know that they have been hacked.”  These grim words...

Ransomware in 2022: what can we expect?

Ransomware will likely continue to evolve and increase in complexity through 2022 and beyond. It has played a huge role in the increase of...

Russia’s takedown of REvil explained

It was recently revealed that Russian authorities had dismantled notorious ransomware as a service (RaaS) group REvil via a series of raids and arrests. What...

Cybersecurity News week ending 16 Jan 2022 ~ Network Tigers

Cybersecurity news provided by NetworkTigers on Monday, 17 January 2022. SAN MATEO, CA — CISA and FBI issue joint cybersecurity advisory pertaining to Russian cyber threats, Ukraine under...

Common network security monitoring tools

Network security monitoring tools help protect digital assets, including network traffic, while also preventing and responding to unauthorized network intrusion. The progressive nature of...

Zero Trust: What it is and why it matters

Cybercrime, phishing attempts, and security hacks are all on the rise worldwide. These data breaches can be costly to businesses and individuals. They leech...

Cybersecurity News week ending 9 Jan 2022 ~ NetworkTigers

Cybersecurity news provided by NetworkTigers on Monday, 10 January 2022. SAN MATEO, CA — Attackers attempt hacks by mailing USB drives, new Java vulnerability similar to Log4Shell, New...

Was Facebook hacked on 4 October 2021?

If you opened your computer, phone or laptop and saw that social media giant Facebook no longer existed, how would you feel? For some,...

What are the effects of the Kronos ransomware attack?

The December 11th ransomware attack levied against Ultimate Kronos Group (UKG), commonly simply referred to as “Kronos,” has left organizations, businesses and individuals to...

Cybersecurity News week ending 2 Jan 2022 ~ NetworkTigers

Cybersecurity news provided by NetworkTigers on Monday, 3 January 2022. SAN MATEO, CA — Hacker group uses Log4Shell in attempted university attack, Apache releases new Log4j update, cyberattack...

Must businesses accept cyberattacks as the new normal?

“There are two types of companies: those who have been hacked, and those who don’t yet know that they have been hacked.”  These grim words...

Ransomware in 2022: what can we expect?

Ransomware will likely continue to evolve and increase in complexity through 2022 and beyond. It has played a huge role in the increase of...

Russia’s takedown of REvil explained

It was recently revealed that Russian authorities had dismantled notorious ransomware as a service (RaaS) group REvil via a series of raids and arrests. What...

Cybersecurity News week ending 16 Jan 2022 ~ Network Tigers

Cybersecurity news provided by NetworkTigers on Monday, 17 January 2022. SAN MATEO, CA — CISA and FBI issue joint cybersecurity advisory pertaining to Russian cyber threats, Ukraine under...

Common network security monitoring tools

Network security monitoring tools help protect digital assets, including network traffic, while also preventing and responding to unauthorized network intrusion. The progressive nature of...

Zero Trust: What it is and why it matters

Cybercrime, phishing attempts, and security hacks are all on the rise worldwide. These data breaches can be costly to businesses and individuals. They leech...

Cybersecurity News week ending 9 Jan 2022 ~ NetworkTigers

Cybersecurity news provided by NetworkTigers on Monday, 10 January 2022. SAN MATEO, CA — Attackers attempt hacks by mailing USB drives, new Java vulnerability similar to Log4Shell, New...

Was Facebook hacked on 4 October 2021?

If you opened your computer, phone or laptop and saw that social media giant Facebook no longer existed, how would you feel? For some,...

What are the effects of the Kronos ransomware attack?

The December 11th ransomware attack levied against Ultimate Kronos Group (UKG), commonly simply referred to as “Kronos,” has left organizations, businesses and individuals to...

Cybersecurity News week ending 2 Jan 2022 ~ NetworkTigers

Cybersecurity news provided by NetworkTigers on Monday, 3 January 2022. SAN MATEO, CA — Hacker group uses Log4Shell in attempted university attack, Apache releases new Log4j update, cyberattack...

Must businesses accept cyberattacks as the new normal?

“There are two types of companies: those who have been hacked, and those who don’t yet know that they have been hacked.”  These grim words...

Ransomware in 2022: what can we expect?

Ransomware will likely continue to evolve and increase in complexity through 2022 and beyond. It has played a huge role in the increase of...

Russia’s takedown of REvil explained

It was recently revealed that Russian authorities had dismantled notorious ransomware as a service (RaaS) group REvil via a series of raids and arrests. What...

Cybersecurity News week ending 16 Jan 2022 ~ Network Tigers

Cybersecurity news provided by NetworkTigers on Monday, 17 January 2022. SAN MATEO, CA — CISA and FBI issue joint cybersecurity advisory pertaining to Russian cyber threats, Ukraine under...

Common network security monitoring tools

Network security monitoring tools help protect digital assets, including network traffic, while also preventing and responding to unauthorized network intrusion. The progressive nature of...

Zero Trust: What it is and why it matters

Cybercrime, phishing attempts, and security hacks are all on the rise worldwide. These data breaches can be costly to businesses and individuals. They leech...

Cybersecurity News week ending 9 Jan 2022 ~ NetworkTigers

Cybersecurity news provided by NetworkTigers on Monday, 10 January 2022. SAN MATEO, CA — Attackers attempt hacks by mailing USB drives, new Java vulnerability similar to Log4Shell, New...

Was Facebook hacked on 4 October 2021?

If you opened your computer, phone or laptop and saw that social media giant Facebook no longer existed, how would you feel? For some,...

What are the effects of the Kronos ransomware attack?

The December 11th ransomware attack levied against Ultimate Kronos Group (UKG), commonly simply referred to as “Kronos,” has left organizations, businesses and individuals to...

Cybersecurity News week ending 2 Jan 2022 ~ NetworkTigers

Cybersecurity news provided by NetworkTigers on Monday, 3 January 2022. SAN MATEO, CA — Hacker group uses Log4Shell in attempted university attack, Apache releases new Log4j update, cyberattack...

Must businesses accept cyberattacks as the new normal?

“There are two types of companies: those who have been hacked, and those who don’t yet know that they have been hacked.”  These grim words...

Ransomware in 2022: what can we expect?

Ransomware will likely continue to evolve and increase in complexity through 2022 and beyond. It has played a huge role in the increase of...