• 2024 Vulnerability Crisis

    December 16 2024

    The 2024 Vulnerability Crisis – Managing Cybersecurity Threats

    Learn how organizations can meet the onslaught of cybersecurity vulnerabilities, along with five of the most common vulnerabilities and successful management strategies. Find out why there’s a new vulnerability every 17 minutes.

  • Cyberattacks Black Friday

    November 25 2024

    Top 5 Cyberattacks During Black Friday and Thanksgiving

    Find out about the top five biggest cyberattacks for Black Friday and Thanksgiving, from data breaches and ransomware, to see the risks businesses experience during the holidays.

  • Healthcare Ransomware Attacks

    November 22 2024

    Healthcare Ransomware Attacks: How to Prevent and Respond Effectively

    Learn how to protect yourself from healthcare ransomware attacks. We discuss the main security weaknesses, suggest security steps, and offer possible means of protecting patient information.

  • Ransomware attack the Psychology

    October 29 2024

    What Causes Victims to Pay in a Ransomware Attack? The Psychology

    Learn the main reasons why victims of a ransomware attack are forced to pay, such as the need to avoid operational disruption or the deceptive methods used by attackers to establish confidence.

  • Digital Privacy and Trust in an Online World

    April 24 2019

    Digital Privacy in an Online World

    In our normal day to day lives we understand the value of privacy. Locking the door to our homes or closing the curtains to the outside world comes naturally. But as we live more of our lives online and become increasingly dependent on our mobile and IoT devices, why do we give so little thought to our digital privacy?

  • Crypto Jacking Trends

    February 25 2019

    Cryptojacking in the age of cryptocurrency mining

    Whilst the future use and viability of Cryptocurrencies may still be up for debate, the influence Bitcoin (the most famous cryptocurrency) has had on the market is clear– with its valuation peaking at just shy of $20,000 in December 2017.

  • BlackFog Cryptocurrency Mining Protection

    March 7 2018

    Cryptocurrency Mining Protection

    Cryptocurrency mining is the latest trend in hacking (also called Cryptojacking) where code is injected into web sites and is used to hijack the users’ CPU to mine cryptocurrency. This has been driven by a boom in the value of cryptocoins in general and is a way for hackers to make money.

  • Windows PowerShell Protection

    February 20 2018

    Fileless PowerShell Attacks

    Fileless PowerShell attacks are now the preferred weapon of choice for cyberattacks because they provide a number of techniques around existing security. Not least of all, the ability to run directly in memory and remotely download payloads.

  • Dark Web Protection

    November 6 2017

    Dark Web Protection

    BlackFog recently introduced Dark Web protection to prevent data loss, activation and transfer of malware over the Dark Web. With an exponential increase in activity over the Dark Web over the last 12 months it is crucial that your devices are protected from this new threat. The Dark Web ransomware economy alone is growing by 2,500% annually.

  • Disabling Forensic Tools

    July 20 2016

    Disabling Forensic Tools