Proud Sponsors of the MENA Information Security Virtual Conference 2020. CYBER RANGES by Silensec proudly announces its participation as a Platinum Sponsor in the largest cyber security conference of the Gulf and Arab region, hosted by VirtuPort and running this year in safe virtual mode.
Cyber Security News and Podcasts from CYBER RANGES
Podcasts, News and Event Updates
Upcoming Instructor-Led Events
As a result of the global pandemic currently ongoing, we rely on technology more than ever to do our work and interact with friends and family. Social distancing practices have led to the increased time spent in our homes and therefore more time spent on the internet.
The ever-changing cyber threat landscape implies that all businesses should have a functional cyber security awareness program in place. In spite of the increased spending on IT security, cyber-crimes are on the rise. A recent study by Verizon shows that phishing is still the most prevalent threat action in successful data breaches related to social engineering and malware attacks.
Most security tools that are meant to improve the cybersecurity resilience of an organization are very underutilized as the personnel meant to operate them do not have sufficient expertise. Providing security training for employees equips them with the knowledge to efficiently use the tools and become better defenders of the organization.
Despite the rise of collaboration tools such as Skype and Slack, email is still the most common tool for businesses to communicate and manage their day-to-day operations. However, email is one of the easiest ways for cyber-criminals to target organisations because of its easy access and risk of vulnerability from human error.
Hacker, a word that seems to be appearing with greater frequency in the media for the last few years. A word that has been completely distorted by the media for the better part of the last thirty years. A word that has become almost synonymous with criminal, and which requires a qualifier in front of it to try and signify otherwise (“ethical” hacking), and still manages to leave some people unconvinced.
The Valak malware loader is now remodelled to attack in stealth mode and is being used to steal personal data in a more sophisticated way. The creators of this malware are adopting the MaaS (malware as a service) model in collaboration with other threat actors. This new version of Valak 2.0 is known to steal sensitive information from Microsoft Exchange mail systems as well as credentials and domain certificates.
During the last years, the industry and the governmental bodies assessing cyber threat have continuously raised alarms highlighting the increase in number and complexity of the detected cyber-attacks worldwide.
With the growth of internet connectivity and cloud services usage, the world has become a virtual village. Your company’s data is just a hack away. Cybercriminals are becoming more and more adept at navigating security systems and breaching them. That is why cybersecurity is so critical today. Cybersecurity pertains to protecting data from theft and damage by criminals and enemies. You may be interested in protecting:
A good cyber range will be a valuable asset to scenario authors. It will make it easy for them to create and precisely simulate the environment they want, and to assess the users’ response to the scenario.