CYBER RANGES by Silensec is proud to announce its Platinum Sponsorship of the MENA Information Security Conference 2021 hosted by VirtuPort. CYBER RANGES has joined other big names in the industry such as Blackberry, CISCO, Crowdstrike and Trend Micro.
Cyber Security News from CYBER RANGES
News and Event Updates
Gartner has predicted the use of cyber ranges by large organizations to rise from 1% to 15% by 2022. Cyber ranging is an increasingly well appreciated way of boosting cyber dexterity, cyber posture and resilience for nations and organizations alike, since cyber ranging effectively addresses the 3 dimensions of cyber security: people, processes and technologies. This translates into the following number of macro use-cases:
Cyber Range technology – Over last two years, the cyber security market has watched the introduction of a larger and larger number of cyber range technologies, products and related services.
Proud Sponsors of the MENA Information Security Virtual Conference 2020. CYBER RANGES by Silensec proudly announces its participation as a Platinum Sponsor in the largest cyber security conference of the Gulf and Arab region, hosted by VirtuPort and running this year in safe virtual mode.
As a result of the global pandemic currently ongoing, we rely on technology more than ever to do our work and interact with friends and family. Social distancing practices have led to the increased time spent in our homes and therefore more time spent on the internet.
The ever-changing cyber threat landscape implies that all businesses should have a functional cyber security awareness program in place. In spite of the increased spending on IT security, cyber-crimes are on the rise. A recent study by Verizon shows that phishing is still the most prevalent threat action in successful data breaches related to social engineering and malware attacks.
Most security tools that are meant to improve the cybersecurity resilience of an organization are very underutilized as the personnel meant to operate them do not have sufficient expertise. Providing security training for employees equips them with the knowledge to efficiently use the tools and become better defenders of the organization.
Despite the rise of collaboration tools such as Skype and Slack, email is still the most common tool for businesses to communicate and manage their day-to-day operations. However, email is one of the easiest ways for cyber-criminals to target organisations because of its easy access and risk of vulnerability from human error.
Hacker, a word that seems to be appearing with greater frequency in the media for the last few years. A word that has been completely distorted by the media for the better part of the last thirty years. A word that has become almost synonymous with criminal, and which requires a qualifier in front of it to try and signify otherwise (“ethical” hacking), and still manages to leave some people unconvinced.
The Valak malware loader is now remodelled to attack in stealth mode and is being used to steal personal data in a more sophisticated way. The creators of this malware are adopting the MaaS (malware as a service) model in collaboration with other threat actors. This new version of Valak 2.0 is known to steal sensitive information from Microsoft Exchange mail systems as well as credentials and domain certificates.