All Is Fair In Darknet Wars For anyone trying to collect data on the darknet, the last three years have been an incredible challenge. The dark net used to be a collection of simple marketplaces that could be easily indexed … Read More
Digital Risk Protection
Shodan: How We Evaluate Risk and Prioritize Alerts
Shodan: How We Evaluate Risk and Prioritize Alerts Monitoring open ports on Shodan can sound simple, but the reality is that there is a lot of data which regularly changes. Having yet another source that generates multiple alerts is not … Read More
How online learning may have opened the door for ransomware in higher ed
How Online Learning May Have Opened the Door for Ransomware in Higher Ed PYSA ransomware, a variant of Mespinoza ransomware, has been actively targeting the education sector in the past months. According to the FBI, ransomware, malware and DDoS attacks … Read More
F.B.I. Reveals 70% Year-Over-Year Increase in Reported Cybercrime
F.B.I. Reveals 70% Year-Over-Year Increase in Reported Cybercrime The F.B.I. has just published its latest report on cybercrime complaints it received in 2020. The picture drawn should raise concerns for most CISOs, and unfortunately raises even more questions than providing … Read More
Renting A Canadian Bot for Less than the Price of Dinner for Two
Renting A Canadian Bot for Less than the Price of Dinner for Two A botnet is a network of computers infected with malware that allows a malicious actor – the botmaster – to control them remotely. The infected computers – … Read More
How Long Have You Thought about Backup Management this Month?
How Long Have You Thought about Backup Management this Month? We all know we should have backups. It’s not a task we particularly love doing, and it is definitely something that we forget to do unless automated. How many people … Read More
Fireside Chat Video – Ransomware
Fireside Chat – Risks & Solutions of Ransomware David Décary-Hétu, Chief Research Officer at Flare Systems, was joined by: Kevin Magee, Chief Security Officer at Microsoft Canada and Matthieu Chouinard, Founder of In Fidem and Head of Big Data & … Read More
The Criminal Underground: the Last Refuge of Banner Ads
The Criminal Underground: the Last Refuge of Banner Ads In the 2000s, banner ads became popular notably through Google. The search engine has enabled marketers to reach a vast audience through a standard visual message that fit on any web … Read More
The Mirage of Encrypted Phones, and Why They Fail
The Mirage of Encrypted Phones, and Why They Fail In June 2014, the company Silent Circle launched the first version of its Blackphone. This device, running a modified version of Android, promised to reign in difficult to understand privacy and … Read More
Shodan: Where OSINT meets port scanning
Shodan: Where OSINT Meets Port Scanning Shodan is a well-known tool by both security experts and malicious actors. Launched in 2009, it gained popularity in 2013 following media coverage on CNN and Forbes. Where OSINT Meets Port Scanning Shodan is … Read More