Firewalls are Important, but they’re Not Enough

Firewalls are an essential part of your IT security infrastructure. In fact, in many cases, they are the foundation and rightfully so. It’s important to note, however, that the target has changed and so have the perpetrators. These days, the masterminds behind cyber-attacks are infinitely more sophisticated than they once were. Many will stop at […]

Firewall: Start, Stop, Fail; The Red Zone

Firewalls are an essential part of your IT security infrastructure; they are the foundation. However, the target has changed, and most companies have not changed their focus. The current ideology is that hackers install agents on your network and let them do the work. They install them in the Red Zone. This is the weakest […]

TTL time till live

TTL(Time Till Live ) Why Time Til Live (TTL) is a Critical Factor in Your Cyber Security Cyber-crime has become much more sophisticated than ever before. No longer are the threats simply a kid playing in the basement. The cyber war has become a billion dollar industry, netting malware companies and hackers millions. As corporate […]

firedragon on the radio

Sean Galliher former CEO appeared on Computer America: Intel; Cyber Black Ops Linkedin Twitter Google-plus Reddit

press release

FireDragon Breathes New Fight Against Cyber Attacks High-end, Lower Cost Cyber Security for Every Business PR Newswire SACRAMENTO, Calif., Aug. 12, 2015 SACRAMENTO, Calif., Aug. 12, 2015 /PRNewswire/ — After years of experience, research and frontline technology, Cyber Black Ops, Inc. announces the North American launch of FireDragon, the best answer to the growing cyber […]

5 Myths of Virtualization Security: You May Be More Vulnerable Than You Think

  Myth No. 1: My Existing Endpoint Security Will Protect My Virtual Environment While most traditional endpoint security solutions are virtual-aware and provide some low levels of protection for virtual environments, this protection is too limited. It simply isn’t enough to cope with modern threats. Also, the performance brain, especially in large deployments, can cripple […]

Banking malware sniffs out data sent over HTTPS

Careful online banking users can sometimes spot that something is amiss when malware installed on their computer pops up phishing pages or adds fields to legitimate banking forms. But the Emotet banking malware doesn’t bother with that, and sniffs out data sent over secured connections instead. According to Trend Micro researchers, German users are particularly […]

Critical flaw exposes admin passwords of nearly 32,000 servers

Over 30,000 servers with Supermicro baseboard management controllers (BMCs) on their motherboards are offering up administrator passwords to anyone who knowns where to look, warns Zachary Wikholm, a senior security engineer with the Security Incident Response Team of hosting provider CARI.net.This confidential information is made available because the company has created the password file in […]

How Websites and Their Users Get Infected

How Websites and Their Users Get Infected:Given how destructive malware can be, it is alarming just how easily it can infect websites and their users. While many different attack methods exist, injection and cross-site scripting are the most popular. With these types of strikes, users can become infected with malware just by visiting a site. […]

What Is Malware?

 Malware is software designed to attack and damage, disable, or disrupt computers, computer systems, or networks. Hackers often take advantage of website securityflaws, also known as vulnerabilities, to inject malware into existing software and systems with consequences that  can range from the relatively benign—like annoying pop-up windows in a web browser—to the severe, including identity […]