Evaluating Security Practices in Response to Colonial Pipeline And South Korean KAERI Attacks
Zero Trust and Enforcing the Principle of Least Privilege Have Become Crucially Important. By Garret Grajek, CEO, YouAttest In recent news, we have seen several high-profile attacks on major institutions […]
How Cyber Insurance Can Protect Your Business from Breach of Privacy Claims
By Irena Ducic, Growth Marketer, Embroker Article text: Every company that stores and handles sensitive customer, partner, or vendor information has the responsibility to protect that data from a variety […]
New analysis of Diavol ransomware reinforces the link to TrickBot gang
Researchers conducted a new analysis of the Diavol ransomware and found new evidence of the link with the gang behind the TrickBot botnet. In July, researchers from Fortinet reported that […]
Identity Matching: What You Need to Know About It
When asked how they can improve a bank’s security from financial crime, many bankers are at a loss for words. Granted, the question is a broad one and difficult to […]
UNC215, an alleged China-linked APT group targets Israel orgs
China-linked threat actors UNC215 targeted Israeli organizations in a long-running campaign and used false flags to trick victims into believing the attacks was from Iran. A China-linked cyber-espionage group has […]
Australian Cyber Security Centre warns of a surge of LockBit 2.0 ransomware attacks
The Australian Cyber Security Centre (ACSC) warns of a surge of LockBit 2.0 ransomware attacks against Australian organizations starting July 2021. The Australian Cyber Security Centre (ACSC) warns of an escalation in LockBit 2.0 ransomware […]
Conti ransomware affiliate leaked gang’s training material and tools
An affiliate of the Conti RaaS has leaked the training material shared by the group with its network along with the info about one of the operators. An affiliate of […]
Threat actors leaked data stolen from EA, including FIFA code
Threat actors that hacked Electronic Arts in June have leaked full data dump stolen from the company after the failure of the negotiation with the victim. In June, hackers have […]
How to Accelerate SecOps efficiency and extend capabilities with XDR
By Ed Martin, Director of Product Management, Secureworks Security Operations (SecOps) teams have been under pressure since their inception to perform the role of enterprise defender for firms in every […]
LockBit 2.0, the first ransomware that uses group policies to encrypt Windows domains
A new variant of the LockBit 2.0 ransomware is now able to encrypt Windows domains by using Active Directory group policies. Researchers from MalwareHunterTeam and BleepingComputer, along with the malware expert Vitali Kremez […]
IBM Cost of a Data Breach study: Cost of a Data Breach hits record high during pandemic
The ‘Cost of a Data Breach’ report commissioned by IBM Security states that the cost of a data breach exceeded $4.2 million during the COVID19 pandemic. IBM Security presented today […]
Trust Not in Third-Parties
You aren’t on your own in cybersecurity, but you should act like you are By Gregory Hoffer, CEO, Coviant Software Cybersecurity management is a dynamic process. There is no “set […]
No More Ransom helped ransomware victims to save almost €1B
The No More Ransom initiative celebrates its fifth anniversary, over 6 million victims of ransomware attacks recover their files for free saving almost €1 billion in payments. No More Ransom […]
Maximizing the Impact of AI/ML Threat Detection Tools
By Cary Wright, VP Product Management, Endace Companies are increasingly looking to Artificial Intelligence (AI) and Machine Learning (ML) threat detection tools to improve the security posture of the enterprise. […]
XLoader, a $49 spyware that could target both Windows and macOS devices
Check Point Research (CPR) experts have spotted a cheap malware, dubbed XLoader variant, which was upgraded to target both Windows and macOS PCs. XLoader is a very cheap malware strain that […]
New enhanced Joker Malware samples appear in the threat landscape
The Joker mobile trojan is back, experts spotted multiple malicious apps on the official Google Play store that were able to evade scanners. Experts reported an uptick in malicious Android […]
Exploring the Synergies Between HIPAA Compliance and Cybersecurity
By Dr. Rachael Bailey, Healthcare IT Content Consultant at Atlantic.Net As the world finds itself in the clutch of a global pandemic, it is evident that cybercriminals are using the […]
COVID-19 Pushes the Introduction of Secure Digital Government Solutions
The Secure Digital Authentication of Official Documents Plays an Important Role in Times of Pandemic By Andreas Räschmeier, CEO at Veridos In the wake of the pandemic, governments and public authorities […]
It’s Time to Issue Company Passwords Again
By Rob Cheng, Founder and CEO, PC Matic The recent PC Matic Password Hygiene & Habits Report found that only 16% of employers issue passwords to employees. This is an […]
Kaseya releases patches for flaws exploited in massive ransomware supply-chain attack
Kaseya has released a security update to address the VSA zero-day vulnerabilities exploited by REvil gang in the massive ransomware supply chain attack. Software vendor Kaseya has released a security […]
Biden discussed Russian ransomware gangs with Putin in a phone call
President Joe Biden expressed concerns about ransomware attacks carried out by Russian gangs during a phone call with President Vladimir Putin. The recent wave of ransomware attacks carried out by […]
Understanding Why Multi-Signal MDR Matters
Cloud adoption, business applications and remote users continue to expand at exponential rates. Your cybersecurity team is fighting a losing battle to keep pace with your business requirements and growing […]
REvil ransomware gang demands $70M for universal decryptor for Kaseya victims
REvil ransomware is demanding $70 million for decrypting all systems locked during the Kaseya supply-chain ransomware attack. REvil ransomware is asking $70 million worth of Bitcoin for decrypting all systems […]
REvil gang exploited a zero-day in the Kaseya supply chain attack
Kaseya was addressing the zero-day vulnerability that REvil ransomware gang exploited to breach on-premise Kaseya VSA servers. A new supply chain attack made the headlines, on Friday the REvil ransomware […]
Five Steps for Safely Migrating your Workloads to the Cloud
Why security in the cloud is a shared responsibility relationship between the infrastructure provider and the customer By Paul Farrall, CISO at Skytap Organizations moving workloads to the cloud must […]
The builder for Babuk Locker ransomware was leaked online
The builder for the Babuk Locker ransomware was leaked online, threat actors can use it to create their own ransomware strain. The Record first reported that the builder for the […]
In the Midst of COVID-19, We’re Seeing a Pandemic of Cyber Attacks
By Babur Khan, Technical Marketing Engineer – Enterprise Security at A10 Networks In the first quarter of 2021, the COVID-19 pandemic is still wreaking havoc around the globe. The coronavirus […]
ChaChi, a GoLang Trojan used in ransomware attacks on US schools
A new Trojan written in the Go programming language, tracked as ChaChi, was involved in ransomware attacks against government agencies and US schools. Researchers from BlackBerry Threat Research and Intelligence […]
Overcoming Security as a Barrier to Cloud Adoption
By Ron Newman, SVP at NTT Ltd. Security Division The last year has forced organizations into change, both planned and unplanned. Companies have had to pivot, rethink their business strategies […]
Three things’ organizations must do to secure “passwordless”
By Jerome Becquart, COO, Axiad The pandemic forced organizations to accelerate their journey to passwordless with secure authentication methods such as multi factor authentication (MFA), as individuals were expected to […]