Open in app
Home
Notifications
Lists
Stories

Write
Paulo Shakarian
Paulo Shakarian

Home

Feb 8, 2019

Current threats: Fileless malware

Fileless malware is on the rise and is enabling many attacks in recent months. While fileless techniques were prevalent in the last few years, most of the more well-known attacks still accessed the disk and left traces. The last few years have also been a high-point for ransomware. What is…

Security

2 min read

Current threats: Fileless malware
Current threats: Fileless malware

Jan 10, 2019

Major vendors dismissed top vulnerability for malware delivery

Recent reporting by Cisco on information stealing malware — designed to hide from most anti-virus solutions — is leveraging Microsoft Office vulnerability CVE-2017–11882. Does this vulnerability sound familiar? It should. Sonicwall listed it as the most exploited vulnerability in Sep. 2018 Cofense found it was the top vulnerability for delivering…

Security

2 min read

Major vendors dismissed top vulnerability for malware delivery
Major vendors dismissed top vulnerability for malware delivery

Oct 28, 2018

Five questions to ask a cybersecurity vendor selling a “machine learning” solution

Ever since we started CYR3CON, we are continually surprised at the hype cycle surrounding the application of machine learning. Many marketers opportunistically see it as another angle to entice buyers — and in talking to CSO’s — their frustration with the hype, equivocation, and machine learning marketing charlatans is palpable. …

4 min read

Five questions to ask a cybersecurity vendor selling a “machine learning” solution
Five questions to ask a cybersecurity vendor selling a “machine learning” solution

Oct 23, 2018

Patching without Prioritization isn’t Working

Detection dates and continued scanning don’t solve the root cause of the problem: how do you determine which CVEs are likely to be targeted and must be patched? Recent media reports a drastic surge in attacks against Microsoft’s IIS web server totaling 1.7 million attacks in the second quarter of…

Cybersecurity

2 min read

Patching without Prioritization isn’t Working
Patching without Prioritization isn’t Working

Oct 17, 2018

The Cybersecurity labor shortage makes it an exciting time to be a service provider

The cybersecurity talent shortage will continue to grow — with an estimated 3.5 million openings by 2021. If that were a city, it would be the third-largest in the U.S. after New York and Los Angeles. In conversations with various cybersecurity providers of all sizes, it is easy to understand…

Cybersecurity

3 min read

The Cybersecurity labor shortage makes it an exciting time to be a service provider
The Cybersecurity labor shortage makes it an exciting time to be a service provider

Oct 17, 2018

Breach disclosed by the Pentagon highlights the importance of third-party risk

Late last week, the Associated Press reported that nearly 30,000 Department of Defense workers may have had Personally Identifying Information (PII) exposed due to a data breach from a third-party vendor. The information was reportedly associated with travel records. The breach was discovered on Oct. 4th, but there seems to…

Cybersecurity

2 min read

Breach disclosed by the Pentagon highlights the importance of third-party risk
Breach disclosed by the Pentagon highlights the importance of third-party risk

Sep 18, 2018

Machine learning and cybersecurity — trusting the system will be key

There is much discussion about machine learning applied to cybersecurity. Many believe that machine learning will ultimately revolutionize the industry. As IT infrastructure becomes more complicated and intelligence, network traffic, and log data become more difficult to deal with — even with the best analytical tools — machine learning may…

Machine Learning

2 min read

Machine learning and cybersecurity — trusting the system will be key
Machine learning and cybersecurity — trusting the system will be key

Sep 17, 2018

SOC-as-a-service becomes an attractive option for IT providers

The other day, we discussed how the cybersecurity labor crunch will lead to increased business for various cybersecurity service providers (MSSP’s) and how MSP’s, VAR’s, and other providers can also capitalize on this growing market. But they must build a security practice. This could take time, and a competing IT…

Information Technology

2 min read

SOC-as-a-service becomes an attractive option for IT providers
SOC-as-a-service becomes an attractive option for IT providers

Sep 17, 2018

Current threats: Cryptomining

Several recent studies are telling us that illicit cryptomining is becoming a very large threat. This may leave many threat watchers wondering “what happened to ransomware”? After all, 2017 was a huge year for ransomware. But criminal hacking is a numbers game. There are a limited number of systems susceptible…

Security

2 min read

Current threats: Cryptomining
Current threats: Cryptomining

Aug 30, 2018

What will be the impact of the new Windows 10 Zero-Day?

The recently revealed Windows 10 Task Scheduler Zero-Day illustrates just how quickly the idea of an exploit can become available. Some have referred to the zero-day as bering of “limited impact” as it is a local privilege escalation — which means the hackers have to already be on the machine…

Cybersecurity

2 min read

What will be the impact of the new Windows 10 Zero-Day?
What will be the impact of the new Windows 10 Zero-Day?
Paulo Shakarian

Paulo Shakarian

CEO and Co-Founder of CYR3CON

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable