Cyber Security News and Podcasts from CYBER RANGES

The CYBER RANGES blog is a leading source of industry-led, expert, Cyber Security News, and Information about critical business and cybersecurity for companies, governments and professionals worldwide.

Podcasts, News and Event Updates

Name
Select to Receive News and Updates(Required)
This field is for validation purposes and should be left unchanged.
HAT HACKERY AND THE COLOUR SPECTRUM

HAT HACKERY AND THE COLOUR SPECTRUM

Hacker, a word that seems to be appearing with greater frequency in the media for the last few years. A word that has been completely distorted by the media for the better part of the last thirty years. A word that has become almost synonymous with criminal, and which requires a qualifier in front of it to try and signify otherwise (“ethical” hacking), and still manages to leave some people unconvinced.

Read More »
MALWARE NEWS AND LATEST TRENDS ON INFOSECURITY

MALWARE NEWS AND LATEST TRENDS ON INFOSECURITY

The Valak malware loader is now remodelled to attack in stealth mode and is being used to steal personal data in a more sophisticated way. The creators of this malware are adopting the MaaS (malware as a service) model in collaboration with other threat actors. This new version of Valak 2.0 is known to steal sensitive information from Microsoft Exchange mail systems as well as credentials and domain certificates.

Read More »
LEARN TO SELECT THE RIGHT CYBER RANGE FOR YOU!

LEARN TO SELECT THE RIGHT CYBER RANGE FOR YOU!

With the growth of internet connectivity and cloud services usage, the world has become a virtual village. Your company’s data is just a hack away. Cybercriminals are becoming more and more adept at navigating security systems and breaching them. That is why cybersecurity is so critical today. Cybersecurity pertains to protecting data from theft and damage by criminals and enemies. You may be interested in protecting:

Read More »
RISK MANAGEMENT IN IT SECURITY

RISK MANAGEMENT IN IT SECURITY

In an increasingly digital world, organizations are constantly facing dynamic threats that pose different levels of risk to their digital resources, employees and reputation. A breach of a company’s network could have far-reaching consequences including financial losses, unending lawsuits and permanent loss of reputation.

Read More »
CYBER ACCESS PROTECTION, FREQUENTLY ASKED QUESTIONS

CYBER ACCESS PROTECTION, FREQUENTLY ASKED QUESTIONS

Cyber access refers to how users and organizations access and interact with each other in cyberspace. Cybercriminals are becoming better and stealthier by the day. There is a need to practice cyber hygiene. This is to protect your data, financial information and anything else you want to keep out of reach.

Read More »
Scroll to Top