Latest Posts with hacking tag

hacking

123 Articles 0 Followers


This is How to End Ransomware

27 Jul 2021 1 minute read 5 comments Matthew Rosenquist

We can rid the world of ransomware attacks to such an extent they are no longer a likely risk vector! It is possible, but we all have to work together. This is not a sales pitch; in fact, I explain why no product or service can truly deliver us from...

Ransomware Explained - Ending Ransomware

14 Jul 2021 1 minute read 4 comments Matthew Rosenquist

Stopping ransomware from being an impactful menace is the grand goal, but what are the specific criteria for success we should be striving for? Without clear objectives, we are often consumed with trivial aspects and never attain the desired end-sta...

Ransomware Explained - 3 Fundamental Ways to Stop Cyberattacks

6 Jul 2021 1 minute read 0 comments Matthew Rosenquist

There are only 3 fundamental ways to stop attacks from motivated and intelligent adversaries. Let’s identify and explore those options, and discuss how they may be applied to undermine Ransomware.   This video is the latest installment of a multi-pa...

Ransomware Cybersecurity Fireside Chat

29 Jun 2021 1 minute read 0 comments Matthew Rosenquist

In today’s fireside chat, we discuss the relevance, proactive, and reactive considerations every organization should consider as they face Ransomware.  I am joined by Alex Rayter, Principal at Phoenix 2.0, and Justin Daniels, Corporate Cybersecurity...

Ransomware Explained - Understanding the Attackers

23 Jun 2021 1 minute read 1 comment Matthew Rosenquist

Understanding the attackers is the first step in identifying an effective, efficient, and sustainable paths to mitigating the risks of ransomware. The root cause of ransomware resides with the people behind the attacks.  Recognizing threat agent’s...

Ransomware Explained Video Series

9 Jun 2021 1 minute read 2 comments Matthew Rosenquist

Ransomware is a rising threat to every organization, device, and person connected to the Internet.  All the products, services, and critical infrastructures are at risk of being victimized.  We are all being impacted by this type of cybercrime and i...

The Colonial Pipeline Cyberattack Might be Good for America

17 May 2021 1 minute read 0 comments Matthew Rosenquist

The Colonial Pipeline ransomware attack, that caused fear of fuel shortages on the US East Coast, might be exactly what the nation needed to improve Critical Infrastructure security! In this week’s video, I discuss why the attack was a much-needed w...

Wi-Fi has had a vulnerability ever since it's inception

13 May 2021 1 minute read 0 comments Lukros76

A security researcher that has been researching Wi-fi and discovered many previously unknown flaws within the system, Mathy Vanhoef, recently discovered a new group of vulnerabilities he's named "FragAttacks". The vulnerabilities are mostly connected...

Top 10 Things the Industry Can Do Now to Mitigate Digital Supply-Chain Attacks!

11 May 2021 1 minute read 0 comments Matthew Rosenquist

The SolarWinds and Exchange supply-chain attacks have highlighted how vulnerable 3rd party and vendor security is for every organization.   The industry must fundamentally change to manage the growing risks and it will take time.  There are some ste...

Be Careful of Unmasking & Dusting Attacks

18 Apr 2021 3 minute read 1 comment Suny Ag

Today a bitcoin is worth $60K and even the smallest part of it, the Satoshi, is considered valuable. If you combined the price of some Satoshi, that also becomes large enough. The same goes for Ehereum which is even more vulnerable to such attacks. ...