As you may have noticed, we have posted a lot on LinkedIn recently about new cyber attacks. The biggest link between these is that those attacks are commonly caused by not following best practices, or relying only on “legacy” security tools and/or the use of weak passwords.Even with the use...
MENDEL TECHNOLOGY MAXIMIZES SECURITY FOR COST
Cybercrime is evolving at drammatic speed and at every moment, hackers and attackers are figuring out new strategies to compromise organizations and industries. The cybersecurity sector must not fall behind these attackers.But the number of technologies claiming to create cybersecurity is vast. Organizational spending and reallocating investments to the right...
THREAT HUNTING WITH MENDEL
“Threat hunting,” or “cyber threat hunting” is the process of proactively and iteratively searching through networks and datasets to detect threats that evade existing automated tools and is done by a threat hunter or security analyst. It is essential for network security because it works to identify hidden threats within...
GREYCORTEX MENDEL DETECTS BADRABBIT
GREYCORTEX is happy to report that it is able to detect the BadRabbit ransomware. This ransomware appeared in Eastern Europe (Russia, Ukraine) but has begun to spread across several countries including South Korea, Poland, the Baltic, and regions. It uses an NSA-based exploit known as “EternalRomance” to enter networks and...
MENDEL: SECURITY AND VISIBILITY IN NETWORK MANAGEMENT
Network management is a stressful proposition, comprising not only the administration of the network, but also maintaining its performance, provisioning devices, etc. With the number of devices in a network growing - due in part to IoT within the office and BYOD which come and go frequently, and the risks...