Some perspectives on the rise of ransomware attacks

 Some perspectives on the rise of ransomware attacks
Crime as a Service has evolved into Ransomware as a Service (“RaaS”). The rise of ransomware attacks on companies and the way they are escalating both in terms of scale and tactics is something that was in the making for quite some time. I wished to document my own thoughts...

How I got myself a capable laptop

 How I got myself a capable laptop
It all started with my old (and very hated) HP Pavilion notebook (i5, 12 GB RAM, 500 GB HDD) almost dying on me. I wanted to get a new laptop, the only reason I stuck with HP for so many years was that I got it as a gift and I wanted to squeeze every drop of use I could...

Assessing a cyber security candidate

Assessing a cyber security candidate
I typically assess a senior cyber security candidate across 7 basic domains for a technical interview, before I actually jump into security. Sometimes, a candidate is so good in these domains that asking questions about security becomes an afterthought. A dipstick feedback...

The Rescure Cyber Threat Intelligence Project - Sensor Update

The Rescure Cyber Threat Intelligence Project - Sensor Update
We have massively upgraded our sensor detection, logging and monitoring capabilities at rescure.me - we detected around 350K attacks in last 24 hours which are then funneled and curated as feeds by our co-relation system. This included removing code cruft, updating data...