NormShield Blog

The 10 Most Promising Cybersecurity Solution

Normshield Recognized on The 10 Most Promising Cybersecurity Solution Providers List

Normshield Recognized by CIOReview Magazine on 10 Most Promising Cybersecurity Solution Providers List of 2018. “CIOReview has shortlisted the most cutting-edge solutions that offer tailor-made and efficient solutions for cybersecurity”. The annual list consists of 10 companies at the forefront of providing cybersecurity solutions and impacting the industry. CIO Review featured Normshield’s unique capability of […]

Annual reports

Hold Your Annual Reports for Late Massive Data Breaches; Quora and Marriott

Around this time of the year, many cybersecurity-related companies gather their statistics to publish annual reports for cyber events for the year. However, massive data breaches (such as Quora and Marriott) that hit the news in the early days of December do not let them wrap-up those reports. Some of them are candidates of the […]

Major third-party breaches revealed in November 2018

Major Third-Party Breaches Revealed in November 2018

A recent survey conducted by Ponemon Institute reveals that 56% of companies have experienced a 3rd-party breach in 2017, which is an increase of 7% compared to previous year. Data breaches caused by third parties cost millions of dollars to large companies. Third-parties include broad range of companies a company directly worked with such as […]

Phishing Domain

Are There Any Domains Impersonating Your Company For Phishing?

Learn with Normshield Free Phishing Domain Search. Jack, a manager in a major company called example.com, receives an e-mail from his company to check out his updated salary for the next term. Jack, expecting a raise, excitedly clicks the link in the e-mail. The link forwards him to company’s employee login page and he enters […]

Black Friday Special

Black Friday Special: Potential Phishing Sites Have Quadrupled in The Last 6 Months

Every year, Black Friday shopping shift to online stores rather than conducting old traditions such as camping just outside of the stores and rushing to gates. Online stores are easier to shop, search among different types of items, and get the Black Friday Specials. While “less in-store shopping on Black Friday” becomes a trend, US […]

Third-party attack on cryptocurrency exchange

Third-Party Attack on Cryptocurrency Exchange Gate.io

One of the largest cryptocurrency exchange, gate.io, was targeted by a third-party, aka supply-chain attack. The attackers inserted a malicious code to a Web Analytics tool, called StatCounter, to steal bitcoins from gate.io. A sophisticated attack with one goal; BTC theft As the latest ESET research reveals thedetails on the attack, we see that it […]

Many major companies including Amazon, Apple, etc

Major third-party breaches revealed in October 2018

A recent survey conducted by Ponemon Institute reveals that 56% of companies have experienced a 3rd-party breach in 2017, which is an increase of 7% compared to previous year. Data breaches caused by third parties cost millions of dollars to large companies. Third-parties include broad range of companies a company directly worked with such as […]

Cyber Exposure

Reduce Your Cyber Exposure to Mitigate Your Cyber Risk

Today many companies invest in digital platforms, cloud services, Internet-of-Things (IoT) systems, Software-as-a-Service (Saas) systems, web-based applications, mobile applications, and advanced automation systems for digital transformation. With the increase in digital transformation, despite its great advantage to ease business and development processes, the cyber risk increases with the expanding cyber exposure. The bring-your-own-device (BYOD) policies […]

Misconfigured cloud servers top 10

Open Invitation to Hackers: Misconfigured Cloud Servers

Many companies use cloud servers to store their data. Despite their great advantage, misconfigured servers may expose sensitive data, a mistake which is an open invitation to hackers to dump and use a company’s data for their malicious activities. How is it possible? 4th party service providers, such as cloud storage providers, improve their cyber […]