Content added to Folio

Research, News, and Perspectives

Add Filters
Filter by:
Hindsight is 2020: Looking Back on the Year From a Cybersecurity Perspective
Cyber Threats

Hindsight is 2020: Looking Back on the Year From a Cybersecurity Perspective

As we head deeper into 2021, let’s take a look back on some of the most notable security stories and trends from the past year, all of which are covered in our 2020 annual cybersecurity report.

February 23, 2021

Emotet One Month After the Takedown

2021 got off to a fantastic start for the cybersecurity community with the news that the infamous botnet Emotet had been brought down in a coordinated global operation, "Operation Ladybird."

Expert Perspective Mar 02, 2021

Save to Folio

Expert Perspective Mar 02, 2021

Save to Folio

Ransomware

Povlsomware Ransomware Features Cobalt Strike Compatibility

Povlsomware is a proof-of-concept (POC) ransomware first released in November 2020 which, according to their Github page, is used to “securely” test the ransomware protection capabilities of security vendor products.

Research Mar 01, 2021

Save to Folio

Research Mar 01, 2021

Save to Folio

This Week in Security News - Feb, 26, 2021

Trend Micro 2020 Annual Cybersecurity Report and More Than 6,700 VMware Servers Exposed Online and Vulnerable to Major New Bug

Annual Predictions Feb 26, 2021

Save to Folio

Annual Predictions Feb 26, 2021

Save to Folio

Cyber Threats

Security Risks for Audio-centric Social Media Apps

Use of audio-only social media apps has been steadily capturing the interest of more users but just like any other technology, apps like these are not immune from security risks.

Research Feb 24, 2021

Save to Folio

Research Feb 24, 2021

Save to Folio

Cyber Threats

Here we go again with “Next-Gen”

The new center square on the XDR buzzword bingo card.

Expert Perspective Feb 24, 2021

Save to Folio

Expert Perspective Feb 24, 2021

Save to Folio

Ransomware

An Analysis of the Nefilim Ransomware

Nefilim is known for its double extortion capabilities and notable attacks in 2020. We give an overview of its techniques and tools in this entry.

Research Feb 23, 2021

Save to Folio

Research Feb 23, 2021

Save to Folio

Exploits & Vulnerabilities

Gauging LoRaWAN Communication Security with LoraPWN

This second part of our series on LoRaWAN will discuss the security of LoRaWAN communication and possible attacks on vulnerabilities. We also dive into the comprehensive testing environment used to assess this issue: specific optimization techniques with software-defined radio (SDR), and the tool we created to help decode LoRaWAN packets.

Research Feb 19, 2021

Save to Folio

Research Feb 19, 2021

Save to Folio