Many businesses are altering their normal business functions due to COVID-19, and the change to remote work adds more strain to network administrators and IT security teams everywhere. Cyber-criminals, nation-state actors, and others are more than willing to adapt their tactics, techniques, and procedures to exploit vulnerable organizations during this time of transition.  In fact, malicious cyber actors have already made several attempts to use this pandemic to target organizations with malicious schemes.

Read more

Cloud services leader, anxious to protect infrastructure against growing threat landscape, turns to SOD’s Threat Watch monitoring solution, for real-time discovery of suspicious activity and the ability to react decisively to avert damage to reputation and data February 20, 2020; San Diego, CA, United States; Tel Aviv, Israel Security On-Demand (SOD), a global leader in […]

Read more

The Insider Threat continues to be among the most critical and dangerous threats that face organizations.  Our very own Director of Security Operations, Steven Bay, lived through such a threat first hand as he was Edward Snowden’s manager at the time Snowden revealed himself to be the man behind the NSA leaks in 2013.  He […]

Read more

Major security breaches are ubiquitous in 2019. New breach stories are written every week – state-owned petroleum companies, major healthcare providers, police and intelligence agencies. And they aren’t going anywhere. As we work tirelessly to enhance our capabilities, theirs get even more sophisticated. We’d like to shine a light on three significant breaches from 2019, […]

Read more

The security landscape continues to change, and vendors are making choices in response to emerging threats in the global threat landscape. Recently, Mozilla decided that they would be rolling out a planned security feature for their popular Firefox web browser that would make DNS over HTTPS the default protocol for DNS traffic.  Being a relatively […]

Read more

Network and system scanning by external 3rd parties are as common as weeds growing in a garden, and it is about as useful too.  Scanning occurs for a variety of reasons: it could be a search engine attempting to index your public environment and website, an ISP evaluating their autonomous system, universities conducting research, or […]

Read more

Security-On-Demand recently caught up with cybersecurity expert Sai Huda. Sai Huda is a globally recognized cybersecurity expert and author of the best-seller, Next Level Cybersecurity: Detect The Signals, Stop The Hack. He is a frequent keynote speaker at industry conferences speaking on cybersecurity risk management best practices. Below are Huda’s insights on the ever-increasing threat, […]

Read more

Written by: Carmen Silva, Analyst Team Manager Phreaking is a slang term for hacking into secure telecommunication networks or using a computer or other device to trick a phone system. The term phreaking originally referred to exploring and exploiting the phone networks by mimicking dialing tones to trigger the automatic switches using whistles or custom […]

Read more

Steganography is a methodology of hiding information in the unnecessary pixels of a picture.  While it is not terribly common, hackers have used it in a variety of ways, from hiding malware to sending commands and information and exfiltrating data.  Steganography can be very difficult to detect as the image itself looks the same as […]

Read more

Written by: Evan Stewart, Cyber Security Operator With communication infrastructure being built on an internet/Ethernet-based interaction, it is only natural that the Aviation industry would adopt the speed and necessity of the same technology. However, with those changes, the concern for digital/data security is put into question. At Defcon 27, the Aviation Village was introduced […]

Read more
Contact Us

We're threat hunting! Send us a quick email here and we will get back to you asap.

Not readable? Change text. captcha txt

Start typing and press Enter to search