Copy
Share Share
Share Share
Share Share
Forward Forward
January 2021

What Are the Steps TowardsImplementing the Zero Trust Model?


Zero Trust Model is a security concept that is massively different from conventional network security. In simple words, it acknowledges that trust is a vulnerability. In other words, it is a model that demands strict authentication and authorization of all users, including those working inside the company’s internal network. Once verified, it grants access to data and applications.

With zero trust architecture, no unique technology is associated. It is an all-encompassing approach to network security that includes various technologies and principles. In addition, it makes use of modern technologies, such as IAM (identity and access management), next-generation endpoint security, and multifactor authentication technologies. These technologies help authenticate the identity of the user and maintain system security.

Read Full Article

Logchecker – New Tool for Threat Intelligence by LIFARS


Logchecker is a new Windows and Linux tool for scanning log files, developed by LIFARS. It extracts IP addresses, domain names, and hashes from the input file and checks for them in the Threat Intelligence database. It supports Windows EVTX logs, text-based logs, or any plaintext files. Output can be in CSV format for better human readability or in JSON for computer processing.

Our Logchecker uses the YETI platform as a backend. Thus, it can benefit from all the YETI machinery, including many feeds and analytics plugins. We believe that cybersecurity is a shared responsibility and we appreciate the work of YETI developers and cybersec community. Therefore, we decided to publish our Logchecker tool under Open Source MIT License. Consider it as our contribution to the community, so all defenders can benefit from it.
Read Full Article

Yes, You Can Stop Using WhatsApp—But Don’t Make This ‘Dangerous’ Mistake

 
By Zak DoffmanContributor, Cybersecurity, Forbes.com

WhatsApp’s recent PR disaster has seen tens of millions flock to other platforms. Millions more are now planning to do the same, after a backlash over data sharing with Facebook. But beware—not all messengers are the same and you could be taking a more ‘dangerous’ risk than you realize. So, what should you do now?


“Using WhatsApp is dangerous,” Telegram’s founder Pavel Durov warned last January, citing cyberattacks against WhatsApp running on phones belonging to key targets, including Jeff Bezos. A year on and Durov is now celebrating “the largest digital migration in human history,” writing that “in the first week of January, Telegram surpassed 500 million monthly active users—25 million new users joined Telegram in the last 72 hours alone.”
Read Full Article
Facebook
Twitter
LinkedIn
Instagram
Instagram
RSS
Website
Email
About LIFARS
LIFARS is an elite cybersecurity, digital forensics, and incident response firm based in New York City. At LIFARS, we believe that cybersecurity is a matter of trust – that is why most of our services are rendered onsite at your premises to establish a personal relationship. Our solutions are based on industry best practices and hands-on expertise stemming from decades of experience. LIFARS conducts digital forensic investigations, incident response, web application security testing, digital risk assessments and academic research. LIFARS continuously explores the latest innovation in the cybersecurity field, and seeks to stay one step ahead of tomorrow’s industry landscape.
Copyright © 2018 LIFARS, All rights reserved.
244 Fifth Avenue, Suite 2035, New York, NY 10001   |   www.lifars.com   |   +1 (212) 222-7061   |   unsubscribe