If Phishing is #1 Attack then how to Defend Against?
Tips and tricks against a phishing cyberattack is what we need if 80% of all cyberattacks are Phishing email is a lie – attempts to get you to click on…
Fileless Malware Attacks VERY Hard to Detect
As a Malwarebytes blogpost states, here are 5 reasons why fileless malware is used by attackers: The most common use cases for fileless malware are: Initial access. The first step…
Log4J: 4 Month Old Vulnerability – All is Fixed Right?
is everything fixed now about 4 months after the vulnerability was disclosed (and discussed here December 13,2021) So on this day in March (the 4th) Threatpost has a story from…
PCI 4.0 Here What it Means
First of All, PCI 4.0 will not remove the previous version (3.2.1) it will enhance the PCI standard (this information is from the “At a Glance” document at www.pcisecuritystandards.org) What…
Catch22 CyberDefending: Why Defense Always Behind
why is the defense always behind? Are there some things that we inherently do not like to do?If there is something that is denying us from doing what is necessary…