Divi-Category-Page-Template - ThreatWarrior
Ransomware Protection with ThreatWarrior

Ransomware Protection with ThreatWarrior

Ransomware is growing at an alarming rate -- up 150% in 2020 and spiking even higher in 2021, with more than half of infected businesses paying the ransom. (1) The list of high-profile ransomware attacks grows almost daily, affecting government agencies, critical...

ThreatWarrior: Design Principles

ThreatWarrior: Design Principles

At ThreatWarrior, we often collaborate on key projects. One that requires us to be aligned internally is our thinking on the core elements of our product strategy, or our design principles.  First and foremost, everything we do as a company has one bottom-line...

Deconstructing Vendor AI Exaggerations

Deconstructing Vendor AI Exaggerations

Artificial intelligence and machine learning are guiding research, accelerating product development, improving security and more across numerous industries including our nation’s most critical infrastructures. However, many vendors camouflage true capabilities through...

Breach Blog: NASA’s Jet Propulsion Laboratory (JPL)

Breach Blog: NASA’s Jet Propulsion Laboratory (JPL)

In 2018, NASA’s Jet Propulsion Lab (JPL) — a federally-funded research and development center that manages multiple deep space missions for NASA — was breached by hackers using a cheap, build-it-yourself Raspberry Pi computer. But that’s just the tip of the iceberg....

Breach Blog: The Texas Ransomware Attack

Breach Blog: The Texas Ransomware Attack

Prep your systems and local governments. 2019 is the year of government-targeted ransomware. At least 22 Texas towns were recently hit by a malicious, coordinated ransomware attack – the first of its kind to hit the public sector. It’s unclear at this time how the...

Different Cybersecurity Frameworks

Different Cybersecurity Frameworks

There are numerous challenges to building and managing an information security program. Organizations need to comply with industry regulations, state directives and even international statutes in some cases. Cybersecurity frameworks offer a way to address your cyber...

Zero-Day Attacks Explained

Zero-Day Attacks Explained

Zero-day attacks… an almost-menacing, militant-sounding term. Zero-day attacks (or zero-day exploits) are actually cyberattacks that take advantage of previously-unknown vulnerabilities in software. Zero-days are called so because the vulnerabilities are exploited...

Insider Threats

Insider Threats

The Russian cyber attack on the 2016 Presidential Election has brought cybersecurity to the forefront. Regardless of which industry you’re in, that attack made it abundantly clear we’re all at risk of cyber breaches. But don’t kid yourself – it isn’t just foreign...

National Cybersecurity Awareness Month

National Cybersecurity Awareness Month

If you own an internet-connected device and like to surf the web, awareness of how you can protect yourself from cyber-attacks should already be a paramount issue. However, if you have not been the victim of a hack or a phishing expedition, you may think cybersecurity...

Phishing Explained: Don’t Get Hooked

Phishing Explained: Don’t Get Hooked

If you have an email account, it’s likely you’ve experienced a phishing attack. Simply put, a phishing attack is when a person with nefarious intent sends you an email that appears to be from a company or person you know. The text of the email often warns that there...

Advanced Persistent Threats – What Are They?

Advanced Persistent Threats – What Are They?

There are different levels of threat concerning cybersecurity. Sophisticated, prolonged attacks (usually carried out by a nation-state, organized criminal element, rival corporations with the intent of spying on your business, or terrorists) are referred to as...

Malware, Ransomware, Virus… What’s the Difference?

Malware, Ransomware, Virus… What’s the Difference?

Like it or not, cyberspace is full of cybercrime. Hackers keep finding novel ways to take advantage of security flaws and breach organizations. Common weapons these cyber actors use include malware and viruses, and a widely-used technique for network infiltration is...

Threats are Evolving, Your Cybersecurity Should Too

Threats are Evolving, Your Cybersecurity Should Too

With today’s rapid technological advances, cybercriminals’ tactics are growing more sophisticated and the threats are rising in complexity. Cyber agents are breaching firewalls and committing espionage with an increasing ability to avoid detection. It seems that each...

Hackers Exploiting an Open Door Policy at Equifax

Hackers Exploiting an Open Door Policy at Equifax

It’s currently unknown how long hackers were in Equifax’s systems before they were detected, or if the ones discovered were the only ones that took advantage of Equifax’s open door policy. What we do know is that they (and potentially others) possibly lived within the...

What the Hack is Going on with Equifax?

What the Hack is Going on with Equifax?

On the cyber frontier, more than 143 million Americans were just hit by a digital disaster, this one in the form of a successful hack against Equifax. Equifax is one of three credit reporting agencies, Experian and TransUnion being the others. They provide credit...

The State of Cybersecurity

The State of Cybersecurity

We’ve had tremendous feedback since we announced ThreatWarrior™, and we appreciate all the kind emails and comments that have poured in. In a previous blog post, I mentioned that with the creation of ThreatWarrior™, ThreatWarrior felt compelled to assist in the...

Future of Cybersecurity: ThreatWarrior

Future of Cybersecurity: ThreatWarrior

Like many others (and probably most of you reading this), over the last year, we’ve observed a significant increase in the number of cyber attacks and a growing diversity in cyber threat type. What’s more, cyber attacks don’t discriminate – commercial industries and...