May 2017

ReSec Halts Jaff Ransomware

2017-05-25T10:34:57+00:00

The world no sooner recovered from the WannaCry ransomware attack that affected 300,000 endpoints, when a related attack began to ravage the user community. ReSec and our clients encountered the new threat - and prevented it. Less than one week after WannaCry’s zero-day surprise, one of our customers received a message that ReSec’s protection system [...]

How to Prepare for the Next Cyberattack – Five Useful Tips

2017-05-19T00:37:49+00:00

One valuable lesson we should all learn from last week’s WannaCry ransomware attack is this: once a vulnerability has been discovered, or another organization has been hit with a breach exploiting a vulnerability – the assumption should be that you’re next. Here are five tips to help you prepare for the next major cyberattack. Check [...]

October 2016

Verizon DBIR 2016 – Back to Basics with Phishing Lessons

2016-12-25T06:43:30+00:00

The Verizon 2016 Data Breach Investigations Report released last week is an extremely comprehensive body of research, quoting over 70 sources worldwide. Yet, despite the fact that it covers multiple business sectors and geographies, one thing is certain: Phishing, an age-old method used by cybercriminals and spies for over two decades is here to stay. [...]

SPAM is Back on the Rise! Prepare, Protect and Defend

2016-12-22T05:53:31+00:00

What's causing the rise of SPAM? A report published today by Cisco's Talos team highlights that, since February this year, spam levels have been slowly growing from 200K messages per day to around 450K.  The last five years we have seen a relatively calm period with respect to spam levels. At the turn of the decade, the [...]

September 2016

Sandbox Solutions: What to Consider Before Adopting One

2016-12-25T06:57:13+00:00

So ,you decided you need to purchase a sandbox solution to improve your organization’s cyber security posture.  And why not? Sandbox is regarded as the most advanced solution, perhaps even the only solution, against sophisticated malware and APT campaigns. But before you commit to this technology, please take a few moments to think about the [...]