Skip to main content


    Ragnar Locker Targets CWT in Ransomware Attack
    Ragnar Locker Targets CWT in Ransomware Attack

      Ragnar Locker strikes again. CWT, formerly Carlson Wagonlit Travel and fifth largest travel management firm, confirmed a cyber attack, which it said occurred the weekend of July 26-27, 2020. According to Threatpost, CWT stated, “We can confirm that after temporarily shutting down our systems as a precautionary measure, our systems are back online and […]

    Cyber Kill Chain
    Steps in the Cyber Kill Chain

    The Cyber Kill Chain is a model developed by researchers at Lockheed Martin that categorizes seven stages of targeted cyber attacks.  The Cyber Kill Chain is used to create an “Intelligence-Driven Computer Network Defense.” This defense model is based on the military concept of the “Kill Chain,” which uses phase-based models to describe different types […]

    Protect Your Enterprise From Github Data Leaks
    Protect Your Enterprise from GitHub® Data Leaks

    GitHub has become one of the most popular development platforms for both enterprises and individuals over the past ten years, as the software is relatively easy to use and new features are constantly being added. Unfortunately, it has also become a rich source for sensitive data leaks. According to ZDNet in early 2019, “A scan […]

    Weekly Marketing/Analyst blog follow-up
    Timeline of Incident Response to Data Leak

    Ms. Amanda Geraud had been an auditor for years.  It has been her job to review business projects and summarize the actions taken, costs involved, as well as  benefits or losses to her employer.   Today felt no different than so many others before, when she had to explain the chain of events leading to preventable […]

    SCADA Data Leaks
    SCADA System Vulnerability Threatens Global Infrastructure

    SCADA under attack In April 2020, Israeli National Cyber Directorate alerted water utility companies after hackers took aim at their systems. The attackers targeted supervisory control and data acquisition (SCADA) systems linked to pumping stations, sewage facilities, as well as wastewater treatment plants. This prompt governmental notification urged energy and water organizations to update their […]

    Data Leaks: Still Doing Cybersecurity Without Machine Learning? Think Again.
    Cybersecurity Without Machine Learning? Think Again.

    When it comes to sensitive data leak, time is of the essence. It doesn’t take long for a leak to turn into a data breach. A few weeks ago, Comparitech’s security research team set up a honeypot simulating a database on an ElasticSearch instance, and put fake user data inside of it. The first attack […]