Blog
Detecting Domain Generating Algorithms
How can we prevent malware from communicating with a C&C server? You may think of using a CTI (Cyber Threat Intelligence) feed with a network blacklisting appliance. You may also think about blocking certain protocols or even using a Next-Generation Firewall to...
Attack on HVAC vendor gave threat actor access to Boston Children’s Hospital
If you think about “supply chain attack” and “HVAC,” you will probably immediately think of the headline-making Target breach of 2013. But that wasn’t the only breach via a third-party HVAC vendor. Just this month, several hospitals in Boston may have narrowly...
Is Your Current Cybersecurity Strategy Right for a New Hybrid Workforce?
Is Your Current Cybersecurity Strategy Right for a New Hybrid Workforce? The global pandemic forced many employees to work from home, and remote working is likely to become a firmly established part of the working routine for employers and employees when it ends. A...