Blog

 

Posts marked with "cybers"

26.09.2023

A Mysterious Broadcast Podcast– UVB-76

In this edition of KüberCAST, Ronnie Jaanhold and Siim Pajusaar, along with guest Andrus Aaslaid, delve deeper into this phenomenon. Tune in to the podcast and discover what lies beneath the seemingly ordinary radio station frequencies.

Keep reading
27.02.2023

How to quantify risk  ?

Can you smell, taste or touch risk? Most probably not. Therefore, IT Risk Expert Bo Thygesen from ACI and KüberCast hosts Siim Pajusaar and Ronnie Jaanhold will discuss how to quantify and measure risk and how to make decisions based on them. During OpSec minutes you will find out that Android TV box with preinstalled malware can be purchased on Amazon and AliExpress. During OpSec minutes you will find out why CISOs should pay more attention to brand impersonations where attacker is impersonating various elements an organization.

Keep reading
13.02.2023

Cyber threat intelligence – your headlights on the internet 

What does threat intelligence mean and is it the weather forecast for internet? What is a cyber threat intelligence (CTI)? Adrian Porcescu from Recorded Future (Director of Product Management, Threat Intelligence) will explain everything with KüberCAST hosts Ronnie Jaanhold and Siim Pajusaar.
During OpSec minutes you will find out why CISOs should pay more attention to brand impersonations where attacker is impersonating various elements an organization.

Keep reading
13.10.2022

Keys that Threaten Your Enterprise Kingdom – Microsoft Windows Domain Takeover

Red-team assessment is recommended, as this type of assessment would show the current company security posture. CYBERS provides expertise and solutions on protecting your environment against these kinds of attacks, so do not hesitate to reach us out!

Keep reading
03.03.2022

Cybersecurity as part of defense measures against modern war fighting capabilities

CYBERS in cooperation with Recorded Future will share insights on the ongoing cyber crisis which started several months before the military invasion. This article provides an overview of the current situation, as well as the recommended emergency actions that should be taken by organizations to withstand this cyber conflict.

Keep reading
20.01.2022

Testing and identifying the value of your next cybersecurity solution

The security world is changing rapidly and we are slowly reaching another huge milestone. Not a very happy one though: manual security operations are no longer sufficient. This is a little bit painful to admit but the fact remains: if you rely on the manual labour of CTOs, CISOs and their teams to react to an incident, then you are in for a very rude awakening.

Keep reading