NormShield Blog

Cyber Insurance GDPR

General Data Protection Regulation (GDPR) and Cyber Insurance

The countdown has begun: the General Data Protection Regulation (GDPR) will be applicable  as of May 25th,2018, aiming to strengthen the rights of the citizens of EU on the internet. This regulation will be implemented by the European Union, but it is also interest of  companies located in other countries, including the United States, which […]

memcached ddos attack

Are your assets at risk of being victimized or weaponized in a Memcached DDoS attack?

Two record-breaking DDoS attacks, which used misconfigured Memcached servers for amplification/reflection, created 1.35 Tbps and 1.7 Tbps bogus traffic towards GitHub and an unnamed US-based company, respectively. Even though amplification/reflection DDoS attacks are not new to the cyber security world, the amount of traffic created is terrifyingly huge thanks to misconfigured Memcached servers’ amplification by […]

Risk Management

3rd Party Risk Management

3rd Party Risk Management; Many organizations have been talking about the third-party risk management for years and it is becoming more complex every day and attracting a lot of attention from the regulators. Most organizations have direct and/or indirect spendings on multiple vendors across the globe that make risk management more complex due to dealing with […]

cyber scorecard

Cyber Security Risk Scorecard; Are You Safe or Not?

Cyber Security Risk Scorecard; Today, almost all companies, regardless of the size or the sector, need to rate their cyber security risk. A reliable and actionable security scorecard can assess the risks and show the ways to eliminate the threats. Generating a security scorecard does not require your personal or secret information. Because they use […]

bitcoin exchange safe

Are Bitcoin Exchange Sites Safe?

Are Bitcoin Exchange Sites Safe and What Are the Vulnerabilities? Bitcoin Mania is all over the world. Bitcoin interest has expanded from Wall Street habitues to housewives in South Korea. Bitcoin trading became so popular that several major websites had to pause the admittance of new accounts. Cyber security is naturally a significant part of this […]

Cyber Insurance

Cyber Insurance; 7 Questions To Ask About Cyber Security

Cyber Insurance; Technology changes and develops so fast that hackers abilities and capabilities can become more comprehensive before you find out how to protect yourself against cyber risks. Considering fast and continuous development of hacking world, finding ideal ways to protect your company against cyber risks can be complicated. But, this doesn’t mean you are […]

Keynotes Phishing

Keynotes APWG Global Phishing Survey 2015-2016 – Malicious and Compromised Domains

Keynotes Phishing; APWG did an analysis of how many domain names were registered by phishers vs. phish that appeared on compromised (hacked) domains. (Why? Because both of them present different mitigation options for responders, and offer insights into how phishers commit their crimes.) A domain is flagged as malicious, if the domain was reported for […]

Keynotes Phishing

Keynotes APWG Global Phishing Survey 2015-2016 – Attack Motivation

Keynotes, Phishing; Attacks where money is handled or moves in commerce are typically designed to directly defraud victims. Attacks on social networks, e-mail systems usually are attempts to harvest credentials for further use. There are continued attacks on ISP’s and other Internet services companies to obtain Internet resources to launch further attacks. There are also […]

Keynotes APWG Global Phishing Survey 2015-2016 – Target Distribution

Keynotes; By using a large dataset of more than 250,000 phishing attacks detected in 2015 and 2016, APWG quantified cybercrime activity and understanding the patterns that lurk therein. They have learned more about what phishers have been doing, and how they have accomplished their schemes. Keynotes; TARGET DISTRIBUTION APWG counted unique target institutions during 2016, […]