Blog

Major Vendors Dismissed Top Vulnerability for Malware Delivery

Paulo Shakarian on Feb 4, 2019 9:02:00 AM

Recent reporting by Cisco on information stealing malware  designed to hide from most anti-virus solutions  is leveraging Microsoft Office vulnerability CVE-2017–11882.

Does..

Training AI to Recognize Cyber Security Threats

Geoff Stoker on Jan 31, 2019 11:23:42 AM

 

Artificial Intelligence Gives Clues About Cyberattack Targets

Rebecca Skubish on Nov 9, 2018 2:24:37 PM

Current Threats: Fileless Malware

Paulo Shakarian on Nov 5, 2018 9:30:10 PM

 

Fileless malware is on the rise and is enabling many attacks in 2018. While fileless techniques were prevalent in 2017, most of the more well-known attacks still accessed the disk and..

Five Questions to Ask a Cybersecurity Vendor

Paulo Shakarian on Oct 30, 2018 9:48:36 AM
 

Five questions to ask a cybersecurity vendor selling a machine learning solution

Ever since we started CYR3CON, we are continually surprised at the hype cycle surrounding..

Patching without Prioritization isn’t Working

Paulo Shakarian on Oct 23, 2018 9:34:13 AM

 

Detection dates and continued scanning don’t solve the root cause of the problem: how do you determine which CVEs are likely to be targeted and must be patched?

Recent media..

Breach disclosed by the Pentagon highlights the importance of third-party risk

Paulo Shakarian on Oct 17, 2018 2:33:04 PM

 

Late last week, the Associated Press reported that nearly 30,000 Department of Defense workers may have had Personally Identifying Information (PII) exposed due to a data..

Current Threats: Cryptomining

Paulo Shakarian on Sep 26, 2018 2:29:40 PM

Several recent studies are telling us that illicit cryptomining is becoming a very large threat. This may leave many threat watchers wondering “what happened to ransomware”?..

Learning from NotPetya

Paulo Shakarian on Sep 26, 2018 2:29:22 PM

What will be the impact of the new Windows 10 Zero-Day?

Paulo Shakarian on Sep 26, 2018 2:28:56 PM

The recently revealed Windows 10 Task Scheduler Zero-Day illustrates just how quickly the idea of an exploit can become available.

Some have referred to the zero-day as bering of “limited..

Contact Us

Tempe, AZ 85280

Email: sales@cyr3con.ai
Phone: (833) 229-0110

Take the next step to be in the know, now.

Complete the form and a member of the CYR3CON team will contact you shortly to discuss your cyber security needs.