Avaddon ransomware gang shuts down their operations and releases decryption keys
The Avaddon ransomware gang has shut down its operations and released the decryption keys to allow victims to recover their files for free. Good news for the victims of the […]
Why Ensuring Cyber Resilience Has Never Been More Critical or More Challenging Than It Is Today
By Don Boxley, Co-founder and CEO, DH2i When it comes to optimizing Microsoft SQL Server high availability (HA) and disaster recovery (DR), there’s a strong correlation between greater database transaction […]
A Digital Journey: A Long and Winding Road
How did we build the internet and not secure it? By David Jemmett, CEO and Founder, Cerberus Sentinel Many people are under the impression that the internet is essentially safe […]
Crypto-mining campaign targets Kubeflow installs on a large scale
Microsoft uncovered a malicious campaign targeting Kubeflow workloads to deploy TensorFlow pods that are used to mine cryptocurrency. Microsoft researchers uncovered a malicious campaign targeting Kubeflow workloads to deploy TensorFlow […]
Data Loss Prevention in Turbulent Times
By Otavio Freire, CTO & Co-Founder at SafeGuard Cyber Data, the saying goes, is the new oil. This probably understates the case: Not only is data at the core of […]
Rethinking Remote Monitoring and Management: How MSPs Can Put Security First and Better Protect Their Clients
By Ryan Heidorn, Managing Partner, Steel Root For most Managed Service Providers (MSPs), using a remote monitoring and management (RMM) platform to centrally manage their clients’ networks is a foregone […]
Key Business Lessons Learned from The SolarWinds Hack
By, George Waller, CEO of Strikeforce Technologies A full year of disruption by the global pandemic has forced businesses to adapt fast to the shifting remote work realities. This new […]
Siloscape, first known malware that drops a backdoor into Kubernetes clusters
Siloscape is a new strain of malware that targets Windows Server containers to execute code on the underlying node and spread in the Kubernetes cluster. Researchers from Palo Alto Networks […]
StayHackFree – Your Kid’s Sports Team
Your Kids Sports team is better managed than your Cyber Team. By James Gorman, CISO, Authx Your Kid’s Hockey team has better management than your Cyber Security team. Really, I […]
DoJ: Investigations into ransomware attacks must have similar priority as terrorism
The U.S. Department of Justice was to assign investigation on ransomware attacks the same priority as terrorism in the wake of the Colonial Pipeline hack. The U.S. Department of Justice […]
Addressing the Growing Cybersecurity Risks of Cyber-Physical Systems
By Michael Welch, Managing Director, MorganFranklin Cyber Cyberattacks against critical infrastructure and other cyber-physical systems have increased for years. These attacks are particularly concerning because they pose a real threat […]
These 2 attacks allow to alter certified PDF Documents
Researchers disclosed two new attack techniques that allow modifying visible content on certified PDF documents without invalidating the digital signature. Researchers from Ruhr-University Bochum have disclosed two new attack techniques, […]
New Epsilon Red Ransomware appears in the threat landscape
Researchers spotted a new piece of ransomware named Epsilon Red that was employed at least in an attack against a US company. Researchers from Sophos spotted a new piece of […]
Experts devised a new attack to bypass Microsoft PatchGuard
A security researcher discovered a bug in PatchGuard Windows security feature that can allow loading unsigned malicious code into the Windows kernel. Japanese researcher Kento Oki has discovered a bug […]
Understanding The Surge in Cyber Extortion
By Jamie Wilson, Founder and Chairman, Cryptoloc Ransomware is on the rise, and it’s not slowing down. Cryptoloc founder and chairman Jamie Wilson explains the perfect storm of conditions that […]
FBI will share compromised passwords with HIBP Pwned Passwords
The FBI is going to share compromised passwords discovered during investigations with Have I Been Pwned (HIBP)’s ‘Pwned Passwords’ service. The FBI will share compromised passwords that were discovered during […]
French intel found flaws in Bluetooth Core and Mesh specs
Attackers could exploit a set of Bluetooth vulnerabilities, affecting the Core and Mesh Profile specifications, to conduct man-in-the-middle (MitM) attacks. Researchers at the french intelligence agency ANSSI discovered multiple flaws in the Bluetooth Core and Mesh […]
Zeppelin ransomware gang is back after a temporary pause
Operators behind the Zeppelin ransomware-as-a-service (RaaS) have resumed their operations after a temporary interruption. Researchers from BleepingComputer reported that operators behind the Zeppelin ransomware-as-a-service (RaaS), aka Buran, have resumed their […]
5 Tips to Building a Cyber-Smart Culture
Building a strong cybersecurity culture in your organization is not only possible, it’s a necessity. With cyberattacks spanning critical infrastructure, SMBs, retail organizations, and commercial businesses alike, addressing cybersecurity with […]
A dozen Android apps exposed data of 100M+ users
Check Point researchers found 23 Android apps that exposed the personal data of more than 100 million users. Security researchers from Check Point have discovered 23 Android applications that exposed […]
Identity crisis? It’s time to take the holistic approach.
In planning for a secure future hybrid working reality, many IT leaders have reconsidered how they manage the identities on their network. Their workforce now uses new systems and devices, […]
Housekeeping Pitfalls of Vulnerability Management
By Srinivas Mukkamala, Co-Founder and CEO, RiskSense Vulnerability management doesn’t always get the attention it needs until it’s too late. Vulnerability management is siloed and is slow to adapt to […]
How to Prevent Ransomware Attacks On Industrial Networks
Insights into Ransomware attacks, how they spread in industrial networks, and how to prevent them from happening. By Michael Yehoshua, VP of Global Marketing, SCADAfence Since the outbreaks of Wannacry & […]
Humans Just Can’t Cut it Anymore
By Peter Stephenson, PhD, CISSP (lifetime), FAAFS (2015-16) Let’s face it, folks… when it comes to interdicting and stopping a cyberattack we’re tortoises racing the hare. When the adversary unleashes […]
Reconnect with the security industry virtually this June
Building on a successful portfolio of in-person and digital events, IFSEC International is preparing for the opening of a brand-new online marketplace and meetings event this June. Running alongside co-located […]
When it comes to your zero trust strategy, a modern approach to IGA is key
By Rod Simmons, vice president of product strategy, Omada The traditional perimeter approach to security was being dramatically altered long before COVID-19. However, the massive shift to a largely remote […]
FBI and Australia ACSC agencies warn of ongoing Avaddon ransomware attacks
The FBI and Australian Australian Cyber Security Centre (ACSC) warn of an ongoing Avaddon ransomware campaign targeting organizations worldwide. The Federal Bureau of Investigation (FBI) and the Australian Cyber Security Centre […]
Secure Data Recovery Services: Protecting Business Continuity
By Dmitri Kardashev, Founder and CEO, SecureData, Inc. In today’s world, consumers and businesses alike require consistent and easy access to their data. Whether it’s large customer databases that an […]
A cyberattack shutdown US Colonial Pipeline
A cyberattack forced the shutdown of one of the largest pipelines in the United States, the Colonial Pipeline facility in Pelham, Alabama. The Colonial Pipeline facility in Pelham, Alabama was […]
Most of Exim email servers could be hacked by exploiting 21Nails flaws
The maintainers of the Exim email server software addressed a collection of 21 issues, dubbed 21Nails, that can allow attackers to fully compromise mail servers. The maintainers of the Exim […]