1. Home /
  2. Software company /
  3. Active Cypher

Category



General Information

Locality: Costa Mesa, California

Phone: +1 714-477-1045



Address: 3188 Airway Dr 92626 Costa Mesa, CA, US

Website: activecypher.com/

Likes: 79

Reviews

Add review

Facebook Blog





Active Cypher 30.10.2020

https://lnkd.in/dKBEFMH - Join this free webinar to learn how you can easily transform your businesses #cybersecurity. Experts from Active Cypher and Defendify will teach you how to boost protection against increased #cybercrime.

Active Cypher 20.10.2020

Missed our webinar on the "Evolution of Ransomware"? See it here: https://www.youtube.com/watch?v=HjCBPTVMJsk&feature=youtu.be

Active Cypher 15.10.2020

Next stop for ransomware...space? https://www.zdnet.com//ransomware-gang-says-it-breached-/

Active Cypher 28.09.2020

Check out www.RansomDataGuard.com to find out more about Active Cypher's groundbreaking anti-ransomware solution that is proactive, not reactive.

Active Cypher 24.09.2020

White House Email Security Faux Pas? The Executive Office of the President isn't complying with the DMARC protocol, but that has fewer implications than some headlines would suggest.

Active Cypher 19.09.2020

AppSec in the World of 'Serverless' The term 'application security' still applies to 'serverless' technology, but the line where application settings start and infrastructure ends is blurring.

Active Cypher 09.09.2020

Are your IoT gizmos, music boxes, smart home kit vulnerable to DNS rebinding attacks? Here’s how to check A technique for attacking computer networks, first disclosed more than a decade ago, has resurfaced as a way to manipulate Internet-of-Things gadgets, smart home equipment, and streaming entertainment gizmos. Researcher Brannon Dorsey this week posted an essay explaining how smart home hardware can be vulnerable to a trick known as DNS rebinding. He also crafted this website that, with ... The post Are your IoT gizmos, music boxes, smart home kit vulnerable to DNS rebinding attacks? Here’s how to check appeared first on IT SECURITY GURU .

Active Cypher 23.08.2020

Building a malware distribution network is too easy with Kardon Loader Researchers from Netscout Arbor have discovered a downloader advertised on underground forums dubbed Kardon Loader, it allows customers to build a malware distribution network or a botshop. Advs for Kardon Loader were first discovered on April 21, 2018, the author who goes online with the moniker Yattaze asks $50 for the application program and offers it as a standalone build, ... The post Building a malware distribution network is too easy with Kardon Loader appeared first on IT SECURITY GURU .

Active Cypher 13.08.2020

Most small businesses fail to act after a cyber attack Nearly two-thirds (65%) of small businesses in the US fail to act following a cyber security incident, according to the 2018 Hiscox small business cyber risk report. The report also reveals that 47% of more than 1,000 small businesses polled had suffered at least one cyber attack in the past year, and that 44% that reported a ... The post Most small businesses fail to act after a cyber attack appeared first on IT SECURITY GURU .

Active Cypher 09.08.2020

Employers Should Reward Staffers Who Dodge Online Scams, Thwart Ransomware, Study Shows Weak passwords and phishing are two of the most popular attack vectors for cybercriminals looking to steal financial information in the case of regular users or sensitive data such as medical records in situations where bad actors are seeking to profit from extortion or ransomware. OpenVPN, the group behind the popular virtual private ... The post Employers Should Reward Staffers Who Dodge Online Scams, Thwart Ransomware, Study Shows appeared first on IT SECURITY GURU .

Active Cypher 20.07.2020

Texas cancer center faces $4.3M fine for data breaches Federal health officials have ordered the University of Texas MD Anderson Cancer Center to pay a $4.3 million fine for failing to secure health records stemming from data breaches. The Houston Chronicle reports the U.S. Department of Health and Human Services announced Monday that MD Anderson’s failure to encrypt health records violated the 1996 patient privacy law known ... The post Texas cancer center faces $4.3M fine for data breaches appeared first on IT SECURITY GURU .

Active Cypher 02.07.2020

New vulnerabilities in Phoenix Contact switches endanger industrial networks Phoenix Contact, a German electrical engineering and automation company, has disclosed four vulnerabilities in FL SWITCH industrial switches. These devices are used for automation at digital substations and in oil and gas, maritime, and other industries. The vulnerabilities were discovered by Positive Technologies experts Vyacheslav Moskvin, Semyon Sokolov, Evgeny Druzhinin, Ilya Karpov, and Georgy Zaytsev. ... The post New vulnerabilities in Phoenix Contact switches endanger industrial networks appeared first on IT SECURITY GURU .

Active Cypher 30.06.2020

Younger employees identified as main culprits for security breaches in the workplace More than a third of senior executives believe that younger employees are the main culprits for data security breaches in the workplace according to a new independent study into attitudes of the next generation workforce about cybersecurity, commissioned by Centrify, a leading provider of Zero Trust Security through the power of Next-Gen Access. More worrying ... The post Younger employees identified as main culprits for security breaches in the workplace appeared first on IT SECURITY GURU .

Active Cypher 14.06.2020

Organisations need stronger immunity against email-borne infections By Lewis Henderson, VP of Product, Glasswall Solutions The success of the Rubella Macro Builder toolkit has demonstrated that the cyber-crime-as-a-service is in rude health right across Europe. A report from Flashpoint reveals that the toolkit has been used to create malicious macros in Microsoft Office documents sent as email attachments in massive criminal spam ... The post Organisations need stronger immunity against email-borne infections appeared first on IT SECURITY GURU .