Knowing how to read a log and recognizing a behavioral anomaly, especially on non-working days and times, will inevitably reduce the risk of impairment. Recently, Cyberoo’s Incident Response team was engaged after a total Ransomware…
An alarming escalation of attacks exploits the vulnerability CVE-2024-24919, which affects Check Point security gateways. This leak, classified as ‘serious’, allows attackers to extract sensitive information from devices connected to the Internet and enabled with…
We often talk about data protection and how to protect against exfiltration as malware and ransomware attacks of different types continue to proliferate. Nevertheless, the reality is that companies are still doing too little. Cyberoo’s…
The statistics speak for themselves: the increase in ransomware attacks turns out to be across different organizations, regardless of their industry. This phenomenon can be attributed to several factors, including lack of adequate investment in…
Background: Open Directory and Threat Intelligence An open directory is a vulnerability that occurs when file access permissions are not properly configured on a Web server. This makes files and directories that should be confidential…
It often happens to work with companies that have signed contracts with ICT service providers that turn out to be inefficient when needed. In today’s business environment, Cybersecurity management must be configured as a multidimensional…
Realized a new Dashboard for immediate horizontal correlation of alerts The introduction of the new alert management dashboard represents a significant step forward in the way companies monitor and manage internal security. In fact, this…
It is common to have to deal with IT incidents and be faced with undesirable situations, not because of the type or severity of the incident, but rather because of the lack of organization of…
A due foreword on Ransomware as a Service: the ever-evolving threat Ransomware is a type of malware that encrypts victims’ data and demands a ransom in exchange for de-encryption. In recent years, ransomware has become…
Brute force attempts on national VPNs: The cybersecurity landscape right now is marked by a series of brute force attacks targeting various platforms, with a worrying focus on VPNs (Virtual Private Networks). The phenomenon, detected…