September 2 2024
TAG Blog Series 1 – How ADX Supports and Implements Policy
Implementing Anti Data Exfiltration (ADX) solutions is critical for enterprise security. This article provides guidance on establishing effective ADX deployment policies, with a focus on aligning them with business objectives and threat perceptions. Highlighting BlackFog's ADX solution, it explores proactive strategies to prevent data exfiltration, offering valuable insights for practitioners aiming to enhance their security posture.
August 23 2024
Doubleface Takes Down the Website of Donetsk International Airport
Doubleface ransomware, developed in C/C++, utilizes AES-128 and RSA-4096 encryption techniques. It remains undetected and includes anti-analysis features. Explore its key attributes, cost implications, and relevance in cybersecurity.
August 20 2024
Dark Angels Received a Huge $75m Ransom Payment, Who Are They?
In early 2024, a Fortune 50 company paid the Dark Angels ransomware group a record $75 million ransom. Learn about Dark Angels' background, major attacks, and the technical details behind their biggest ransomware payment in history.
August 2 2024
How Can You Make Your Data Security Management as Effective as Possible?
What do firms need to know to ensure they have the strongest data security management measures in place?
November 28 2023
EU Whistleblower Act: Organizations Must Protect Whistleblowers
With the new EU whistleblower act, organizations that fail to protect whistleblowers may face fines and suffer data leaks.
October 5 2023
How Machine Learning is Vital in Successful Data Exfiltration Detection
Why should a data exfiltration detection solution play a key role in your firm's cybersecurity strategy?
August 14 2023
The Data Exfiltration Techniques You Need to be Aware of
What data exfiltration techniques are being used to target businesses with threats such as ransomware in 2023?
August 1 2023
Why do Businesses Need Advanced Enterprise DLP Solutions?
What protections do enterprise DLP tools provide and why should firms be looking beyond legacy solutions to defend against data loss?
June 27 2023
What You Need to Know About Zero Trust Identity and Access Management
Why should firms be implementing a zero trust identity and access management policy to improve their data security?
June 18 2023
Why Exfiltration of Data is the Biggest Cyberthreat Facing Your Business
What do firms need to know about exfiltration of data in order to keep their operations secure?