combatcyber

Latest posts

Hackers Trapped In VR

Hackers can easily outsmart firewalls, as we’ve seen in multiple cyber-attacks of 2018. AI was the next phase, where companies thought that if only machines would learn the environment, they would respond to threats tremendously better than humans ever could.

While several startups are developing better AI technologies, there is one outsider company that is putting firewalls down and is coming out in the open to fight hackers. 

Illusive Networks

A new Israeli startup is using VR (virtual reality) to protect against cyber threats.

6 Bad Ass Cybersecurity podcast’s to watch in 2019

Cybersecurity and Information Security podcasts haven’t exactly been a driving force in the surge of popularity in podcasts. For the amateur or the expert, cybersecurity podcasts can provide great value. It’s a special niche that’s being executed by international experts, in the know enthusiasts, real world executors and security providers.

Here’s our list in no particular order of the cybersecurity and InfoSec podcasts to watch in 2019

1. CyberHub Engage

What is Ransomware and how to protect your PC/laptop against ransomware attacks? – Threat Brief

Since 2010, ransomware has evolved as one of the biggest cyber risks. In fact, 2017 saw more ransomware attacks than ever before. May 12th 2017 saw the biggest ever cyber attack in Internet history (yes, bigger than the Dyn DDoS). A ransomware named WannaCry stormed through the web, with the damage epicenter being in Europe.

Read more about what is ransomware and how you can protect your workstation, PC or laptop against such attacks on Heimdal Security Blog.

Cyber risks contributed by your supply chain

There is nothing new about the risk of cyber-attacks on IT and Industrial Control Systems (ICS). About a decade ago, people believed that cyber-attacks can only be launched through the internet and adopted the principle of air-gap-isolated systems. The famous Stuxnet attack (2010) was the first strong indication that cyber-attack on IT and ICS (known as Operation Technology- OT) organizations can be also launched internally after the adversary entered your facility.

A hacker tried selling stolen military drone documents for $200

Researchers at the cybersecurity firm Recorded Future recently released a report about one of its more interesting findings. 

While scouring the hacker forums on the dark web, the firm’s analysts discovered someone selling MQ-9 Reaper drone documents — maintenance books, training guides, and a list of airmen assigned to the military drone. The hacker was looking for $150-200 for the documentation. 

Three tips to protect yourself from Malvertising

As if advertising wasn't intrusive enough, 'Malvertising' the malicious form of online advertising, used to spread malware, is on the rise.

Malware, 'malicious-software' infiltrates victims computers or wireless devices to extract or attack the data held within. Standard types of malware include: Viruses, Worms; Trojan Horses; Adware; Spyware and Ransomware among a stream of others. Malvertising, the fusion of "Malware" and "Advertising" are ads that try to do the same thing.