Blog

Breach of the Week – Shocked and Amazed

Breach of the Week – Shocked and Amazed

On this week’s episode we are digging into a specific Maze Ransomware attack that hit one of the biggest security firms on the planet. What does it mean when a security company gets hit, how they'll probably be just fine with their billions of dollars, and whether or...

read more
Web App Vulnerability Basics: Path Traversal

Web App Vulnerability Basics: Path Traversal

​This is an article in a series on Web Application Vulnerability Basics. What Is a Path Traversal Attack? Path traversal, also known as directory traversal and backtracking, is an exploit that allows an attacker to access files on a web server that they are not...

read more
Government: the Ultimate Ransomware Target

Government: the Ultimate Ransomware Target

If you pay any attention to cyber security related news, you likely have noticed a large uptick in ransomware attacks targeting state and local governments. These ransomware attacks include Albany New York, Lake City Florida, Jackson County Georgia, Baltimore...

read more
8 Strategies for Secure Backups

8 Strategies for Secure Backups

In the age of ransomware and extreme weather, having secure and redundant backups is critical to ensuring your company can survive and quickly recover from a data loss event. NuHarbor compiled eight tips to ensure your backups are safe, secure, and ready to deploy in...

read more
Zero Trust: Not Just Another Marketing Term

Zero Trust: Not Just Another Marketing Term

Companies love to throw around the term “Zero Trust” when advertising their security products. With all this marketing hype, it is easy to discount Zero Trust as just another marketing gimmick like “synergy.” However, the Zero Trust model can be an effective method to...

read more

Tech Coalition Creates COVID-19 Testing Application

NuHarbor Security recently partnered with tech industry giants including Adobe and Oracle  to develop a “no charge” testing application that is being rolled out to cities and counties around the country.  All the participating organizations donated their resources to...

read more
The Vulnerability of Artificial Intelligence

The Vulnerability of Artificial Intelligence

If you have been in the cybersecurity market for more than five minutes, you will see that every product vendor is offering some variation of artificial intelligence, machine learning, or block chain in order to prevent the next zero-day attack. If you are in the...

read more
What is TrickBot and What Makes It So Dangerous?

What is TrickBot and What Makes It So Dangerous?

What is TrickBot? TrickBot was originally developed in 2016 as a Windows banking trojan intended to capture Personally Identifiable Information (PII) to commit fraud. TrickBot primarily used spear-phishing as an attack vector to target high-level corporate executives...

read more
Six Benefits to Choosing a Cloud MSSP

Six Benefits to Choosing a Cloud MSSP

A Managed Security Service Provider (MSSP) maintains the security surrounding your organization’s infrastructure. MSSPs provide outsourced monitoring and security features that increase your ability to detect and defend against an attack. There are two main types of...

read more