2020 Cyber Attacks In Indonesia
In just 10 months, a whopping 324 million cyber attacks have been detected in Indonesia alone. This number has increased by nearly six-fold from the previous year. Here's a summary of what has happened and how your organization can take the cautionary steps to prevent such incidents.
Actionable Ransomware Defense The Horangi Way.
Understand the mechanics of different ransomware attacks from the MITRE ATT&CK Framework as we feature various scenarios to highlight defense opportunities you can leverage.
On-Demand Webinar: An Introduction to the MITRE ATT&CK Matrix
Want to understand the MITRE ATT&CK Matrix on a deeper level? Uncover common cyber attack patterns to shore up your organization's defenses with the expertise of Horangi Director of Cyber Operations Che Lin Law.
Teach A Man To Phish: Unpacking The Pyrogenic/Qealler Malware
From a trojan received in a phishing email, we break down how the malware is executed and what any organization can do to stay prepared for such security incidents.
Ransomware Attacks in 2020 [Infographic]
Ransomware continues to be a major threat in 2020. Here, we go through some of the high profile ransomware attacks in 2020 and implications to the businesses attacked.
Cybersecurity Labeling Scheme (CLS) in Singapore
The Cyber Security Agency in Singapore (CSA) is launching a Cybersecurity Labeling Scheme as part of its Safer Cyberspace Masterplan to better secure Singapore’s cyberspace and raise cyber hygiene levels.
Real Life Examples of Web Vulnerabilities (OWASP Top 10)
Knowing the common web vulnerabilities is great, but specific examples help demonstrate the relevance of these cybersecurity issues. Let’s take the approach of following the OWASP Top 10 list.
The Cost of Cyber Attacks [Infographic]
A cyber attack compromises the security of a company’s cyber network and creates undesirable consequences for the business. We review the cost of a cyber attack to businesses, the key cyber attacks in 2019, and the importance of a well-fortified cybersecurity system.
Understanding Different Types of Ransomware
We explore the range of ransomware attacks and the basics your organization needs to know to stay prepared and minimize the damaging effects of ransomware.
The Biggest Questions About Ransomware Answered
We go deep into what ransomware can and cannot do — jumping into misconceptions and myths about ransomware attacks and revealing the truth behind those notions.
Why Do Hackers Hack?
Get inside the mind of a hacker in this article as we explore what spurs hackers to do what they do. We learn about the abundant opportunities available for hacks today, including using hacking for good.
A Brief History of Ransomware
Ransomware is as commonplace in our lives today as email. All signs indicate that ransomware is not going away any time soon. So where did this nefarious family of malware come from?
What Is A Man-in-the-Middle (MITM) Attack?
Learn how MITM attacks work, the various types and forms it presents itself in, and appropriate mitigation measures that organizations can take.
Hong Kong's Alarming Cybersecurity Crisis
HK’s Computer Emergency Response Team (CERT) reports security-related incidents jumped 55% from 2017 to 2018.
This Week's Breach - Quora
The latest victims to a large scale cybersecurity breach this week are users of Quora.
Securely Salting And Hashing Your Password
“I have hashed the passwords and stored them in the database, there will be no way an adversary can reverse the hashes”. All too often I have heard this coming out of application developers and infrastructure team. This is true to a certain extent, if the password was complex enough.
Can Social Engineering Be Used For Good?
Social engineering, by definition, is the act of obtaining sensitive information and/or accessing a system via manipulation.
Stay Alert! Check out the Top 4 Cyber Attack Tactics of 2018.
As we transition into the last quarter of the year, let’s review what has happened over the past nine months and cover some of the latest cybersecurity trends! Some of the cyber issues that occurred this year are the PyeongChang Olympic Hacking issue, Web solution vulnerability attack targeting Korean websites, MS Spector vulnerability exposure, Gandcrab ransomware threats, Cryptocurrency exchange
You’ve Been Hit With Ransomware. These Are The Steps To Recovery.
Cybersecurity attacks are becoming increasingly common. From individuals, small to large organizations, government, and private sectors, no one is immune.
Physical Paths to Digital Destruction
On the importance of hardening your physical environment against cyber attacks. When thinking about cybersecurity, it is easy to get lost in complex scripts, the next zero-day exploit or cutting-edge appliances. However, some of the most (least) obvious paths to your internal network may often be overlooked... As a penetration testing consultant for several years, I was involved in dozens