News

TRUSTING YOUR ZERO TRUST ARCHITECTURE

Learn why Active XDR from Fidelis Cybersecurity® is an essential foundational element of a Zero Trust Architecture

BAS will kill the Pentest

Breach and Attack Simulation (BAS) solutions represent a new and emerging market and are directly adjacent to vulnerability assessment, according to the Market Guide for Vulnerability Assessment.

TTPs Used by REvil (Sodinokibi) Ransomware Gang in Kaseya MSP Supply-Chain Attack

Picus Labs has updated the Picus Threat Library with REvil (Sodinokibi) ransomware samples that are used in a massive cyberattack that targets multiple Managed Service Providers (MSPs) and thousands of their customers.

BAS – Bringing light to dispel the darkness of hackers

Experts recommend companies to deploy Breach and attack simulation (BAS)- a method to keep the system safe and secure at an appropriate cost.

Picus’s Report about DarkSide Hacking Group

According to statistics, Darkside has earned nearly 100 million USD in ransom from 47 different victims. The majority of these was paid through a hacker insurance service (Cyber ​​Insurance)