
Application security
Key findings from ESG’s Modern Application Development Security report
A deep dive into security issues In August 2020, the Enterprise Strategy Group (ESG) published its report, “Modern Application Development Security.” ESG is

Malware analysis
Octopus Scanner malware: What it is, how it works and how to prevent it | Malware spotlight
Introduction Octopus Scanner appeared somewhere in 2018. Although its creators are still unknown, the operation of Octopus Scanner has been extensively disc

Vulnerabilities
Tesla Model 3 vulnerability: What you need to know about the web browser bug
Introduction In 2020, Jacob Archuleta, a researcher nicknamed Nullze, discovered an important information security vulnerability on the web browser of the Te

Healthcare information security
Analysis of ransomware used in recent cyberattacks on health care institutions
Introduction In recent years, there has been a steady increase in the number of ransomware attacks on healthcare institutions. The pressure such institution

Malware analysis
PonyFinal malware: What it is, how it works and how to prevent it | Malware spotlight
Introduction to PonyFinal PonyFinal ransomware appeared for the first time in 2020. It is malware that relies on human-operated attacks, i.e., attacks that e

News
Lessons learned from the Fresenius ransomware cyberattack
Introduction to the Snake ransomware Fresenius is a German company that provides various health care services, including services for dialysis of people with

Malware analysis
Agent Tesla: What it is, how it works and why it’s targeting energy companies
Introduction to Agent Tesla Agent Tesla appeared for the first time in 2014, but it has been just recently used for attacks on energy companies operating in

Threat Intelligence
Dark web fraud: How-to guides make cybercrime too easy
Introduction to dark web fraud Dark web fraud constitutes a global information security problem. The widespread availability of how-to guides providing instr

Malware analysis
BazarBackdoor malware: What it is, how it works and how to prevent it | Malware spotlight
Introduction to BazarBackdoor BazarBackdoor is a new malware with the ability to install various types of malicious programs on the infected computers. It is

General security
Five key lessons from the 2020 U.S. Cyberspace Solarium Commission report
Introduction On March 11, 2020, the Cyberspace Solarium Commission (CSC), a governmental commission aiming to identify “a strategic approach to defending the

Malware analysis
Starslord 2.0 malware: What it is, how it works and how to prevent it | Malware spotlight
Introduction The sLoad malware was discovered for the first time in 2018. It delivers various Trojans to the infected computers, including but not limited to