• img December 13, 2017

Emerging trends companies should prepare for in 2018

Today’s organizations face a cyber security landscape that is more difficult to navigate than ever before. To shed light on what lies ahead and help businesses better prepare for emerging threats, Experian Data Breach Resolution released its fifth annual Data Breach Industry Forecast with five key predictions for 2018. “Our threat landscape is constantly evolving, […]

Read More
  • img December 13, 2017

Whitepaper: Top 20 cyber attacks on ICS

The technique for evaluating the risk of cyber-sabotage of industrial processes are well understood by those skilled in the art. Essentially, such risk assessments evaluate a typically large inventory of possible cyber attacks against the cyber-physical system in question, and render a verdict. Communicating the verdict to business decision-makers who are not familiar with cyber-security […]

Read More
  • img December 12, 2017

Microsoft December Patch Tuesday Update Fixes 34 Bugs

Microsoft patched 34 vulnerabilities in all on Tuesday with most of the bugs impacting Microsoft Edge, Microsoft Office and Microsoft’s Scripting Engine.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/microsoft-december-patch-tuesday-update-fixes-34-bugs/

Read More
  • img December 12, 2017

US man is behind the 2015 Hacking Team hack?

Who’s behind the 2015 Hacking Team hack? According to a notice received by Guido Landi, one of the former Hacking Team employees that was under investigation for the hack, a 30-year old Nashville, Tennesee resident might have had something to do with it. Landi received the notice from Italian prosecutor Alessandro Gobbis, which says he […]

Read More
  • img December 12, 2017

eBook: Defending against crypto-ransomware

According to the Symantec 2017 Internet Security Threat Report, the average ransom demand has reached over $1000 in the last year. Therefore, it is critical to take steps to prevent infection and be prepared to restore from backup if prevention fails. A crypto ransomware attack can take hostage not only data stored on a company’s […]

Read More