Nir Valtman, CEO and co-founder of Arnica, offers some tips for newcomers to learn and show off their learning to potential employers, as well as talking about the certs he…
OneNote, Many Problems? The New Phishing Framework
There are plenty of phish in the digital sea, and attackers are constantly looking for new bait that helps them bypass security perimeters and land in user inboxes. Their newest…
The basics of behavior-based security | Cyber Work Podcast
Nir Valtman, CEO and co-founder of Arnica, gives a long but helpful introduction to the idea of behavior-based security. – Get your FREE cybersecurity training resources: https://www.infosecinstitute.com/free – View Cyber…
Bad magic: new APT found in the area of Russo-Ukrainian conflict
In October 2022, we identified an active infection of government, agriculture and transportation organizations located in the Donetsk, Lugansk, and Crimea regions.
When the Absence of Noise Becomes Signal: Defensive Considerations for Lazarus FudModule
In February 2023, X-Force posted a blog entitled “Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers” that details the capabilities of a sample attributed to the Lazarus group leveraged…
Tracking developer behavior can augment DevSecOps | Guest Nir Valtman
Nir Valtman, CEO and co-founder of Arnica, discusses developer behavior-based security. In short, there are lots of ways that backdoors or vulnerabilities can make their way into developer code. One…
The Role of Finance Departments in Cybersecurity
Consumers are becoming more aware of the data companies collect about them, and place high importance on data security and privacy. Though consumers aren’t aware of every data breach, they…
The One Place IT Budget Cuts Can’t Touch: Cybersecurity
If IT spending is slowing, will business leaders follow a similar approach for cybersecurity budgets? Probably not. Gartner predicts that end-user spending on both security technology and services will see…
2022 Industry Threat Recap: Manufacturing
It seems like yesterday that industries were fumbling to understand the threats posed by post-pandemic economic and technological changes. While every disruption provides opportunities for positive change, it’s hard to…
What Does a Network Security Engineer Do?
Cybersecurity is complex. The digital transformation, remote work and the ever-evolving threat landscape require different tools and different skill sets. Systems must be in place to protect endpoints, identities and…