LockBit Hacker Sentenced To 4 Years Jail Plus Fined $860K

Recent reports about legal proceedings, a 34-year-old Russian-Canadian national, Mikhail Vasiliev, has been handed a sentence of almost four years in Canadian prison. Vasiliev’s involvement in the global ransomware scheme known as ...

Building Strong Defences: The Intricacies of Effective Bot Mitigation – Part 1

| | Cybersecurity
Learn how you can assess a bot mitigation provider's ability to detect and stop bots in our new technical blog series ...
Cybersecurity Synergy: Navigating Known and Unknown Threats with LogRhythm Axon and CimTrak

Cybersecurity Synergy: Navigating Known and Unknown Threats with LogRhythm Axon and CimTrak

This podcast episode explores the unique collaboration between LogRhythm Axon and CimTrak, two cutting-edge cybersecurity solutions. Our experts, LogRhythm's Josh King and Cimcor's Justin Chandler discuss how these technologies make security easy, ...

Hackers Target Chinese With Notepad++ and Vnote Installers

In a recent revelation by cybersecurity experts at Kaspersky Labs, a concerning cyber threat has emerged targeting users of popular text editing software in China. This sophisticated attack involves the distribution of ...
How to Tell if an Email is a Scam?

How to Tell if an Email is a Scam?

| | Cybersecurity
Reading Time: 9 min Wondering if the email you just received is a scam? Learn how to spot email scams & and use scam email checkers to protect yourself from crafty phishers! ...

Macro Segmentation vs. Micro Segmentation

Understanding the distinction between macro segmentation vs. micro segmentation, and making the right choice  Within network security segmentation, macro segmentation vs. micro segmentation are crucial methods to consider for organizations aiming to ...

Security Vulnerability in Saflok’s RFID-Based Keycard Locks

It’s pretty devastating: Today, Ian Carroll, Lennert Wouters, and a team of other security researchers are revealing a hotel keycard hacking technique they call Unsaflok. The technique is a collection of security ...
Vector illustration of the medical team.

HIPAA Compliance: Why It Matters and How to Obtain It

What is HIPAA? The Health Insurance Portability and Accountability Act (HIPAA) of 1996 Security Rule established standards for protecting individuals’ electronic personal health information (PHI) (which includes any identifiable health information, such ...

CVE-2023-48788 Vulnerability Reported in FortiClientEMS

Fortinet’s FortiClient EMS product exploited via CVE-2023-48788, a critical SQL injection vulnerability : OFFICIAL CVE-2023-48788 PATCHING INFORMATION : The CISA (Cybersecurity and Infrastructure Security Agency) has alerted organizations to actively exploit ‘The ...