First Gas, Now Meat: Latest Cybersecurity Attack Shows Criminals Are Expanding Their Scope
The good news from the JBS Foods ransomware attack is that it seems to have followed one of the basic tenets of cybersecurity — make back-ups. The bad news is that cybercriminals have expanded their scope beyond stealing business data to sabotaging consumer supply chains.
93% of Fraud Attacks Occur Online
Feedzai has announced its Quarterly Financial Crime Report, an analysis of over 12 billion global banking transactions from January – March 2021. The report identifies trends in spending and in fraud attempts to show that this past quarter, as consumer activities increased, fraudsters attempted to hide their fraudulent transactions in legitimate banking.
White House Urges US Companies to Take Ransomware Seriously
Following recent cyberattacks against key operations in the U.S., the White House is pushing companies to take ransomware seriously and beef up their defenses against it.
JBS Shutters Five U.S. Plants After Ransomware Attack
How many alarm bells need to ring and disruptions occur before companies realize that, no matter the industry or position in the supply chain, they aren’t beyond the reach of motivated cybercriminals and must shore up their defenses? In the latest wake-up call, a “criminal organization likely based in Russia” sent meatpacking giant JBS USA Holdings a ransom demand during a weekend ransomware attack, prompting the U.S. to contact Russia’s government, a White House spokeswoman told reporters Tuesday.
JBS Ransomware Attack Points to Ominous Trend Targeting Critical Industries by Foreign Actors
The JBS attack hit servers supporting the company’s North American and Australian IT systems over the weekend, JBS, one of the largest meat producers in the world, said in a statement on Monday. The company temporarily shut down all its U.S. beef plants.
Only 17% of Organizations Encrypt at Least Half of Their Sensitive Cloud Data
New research by Thales on security trends one year into the pandemic found that about 50% of businesses say that they store more than 40% of their data in external cloud environments, but only 17% have encrypted at least half of their sensitive data in the cloud.
Microsoft Office 365 a Major Supply Chain Attack Vector
Performance issues are not the only concern users have about Microsoft Office 365 and Azure cloud services: the office productivity suite also represents a major threat vector and an attractive target for network and supply chain attacks.
Meat Supplier Cyberattack Has ‘Strong Parallels’ to Colonial Pipeline
JBS USA, part of the world’s largest meat supplier, was hit by a cyberattack on Sunday. The attack once again highlights the vulnerability of global supply chains.
Expert Commentary: The JBS Foods Cyber-Attack
JBS Foods, the world’s largest producer of beef and poultry, disclosed yesterday suffering a shutdown of plant production worldwide due to a cyber-attack. The attack forced the shutdown of the largest slaughterhouses in the world, which may yet cause a rise in global meat prices.
Beef Production Disrupted After Meat Giant JBS hit with Ransomware Attack
The world's largest meat company was hit with a cyberattack that shut down production at processing plants in the United States, Canada and Australia raising concerns about capacity shortages and price increases for consumers.
Microsoft 365: Most Common Threat Vectors & Defensive Tips
As more organizations have grown reliant on Microsoft 365, Google Cloud, and Amazon Web Services, cybercriminals have begun to realize that the shift benefits them and are consequently tailoring their attacks to take advantage of the major cloud platforms in use by organizations.
Meat Producer JBS USA Hit by Cyberattack
A global provider of diversified, food products, and leading processor of beef, pork and prepared foods in the U.S., Canada and Australia - has been the target of a cyberattack, affecting some of its servers supporting its North American and Australian IT systems.
Vectra: 10 Most Common Threats for Azure AD, Office 365 Customers
Research on the most frequently seen malicious behavior in Azure Active Directory and Office 365 found that malicious activity often looks very similar to legitimate user activity, said Vectra AI, a threat detection and response company.
On the Taxonomy and Evolution of Ransomware
Oliver Tavakoli, CTO at Vectra AI, discusses the different types of ransomware. Given the frequency with which “ransomware” appears in news articles, it may be worthwhile to take a step back and actually consider what the term means. Any malware or attack that culminates in extorting ransom from the victim is commonly referred to as ransomware. The general idea is to encrypt the victims’ data and to promise to deliver the key needed to decrypt it in return for a paid ransom.
Vectra AI director on the fragility of critical nation infrastructure
Following on from the recent high profile cyberattack on Waikato’s District Health Board, Vectra AI director of security engineering Chris Fisher explains why ransomware attacks on critical national infrastructure (CNI) are becoming increasingly common. He discusses why the operational threat environment is so different from the IT environment, and what steps governments and private sector enterprises need to be taking now to improve their CNI security posture.
Targeted AnyDesk Ads on Google Served Up Weaponized App
A fake version of the popular remote desktop application AnyDesk, pushed via ads appearing in Google search results, served up a trojanized version of the program. The campaign even bested AnyDesk’s own ad campaign on Google – ranking higher in its paid results.
U.S. to Issue First Cybersecurity Regulations After Colonial Pipeline Ransomware Attack
The Department of Homeland Security (DHS) will issue a directive later this week requiring all pipeline companies to report cybersecurity incidents to federal authorities. The directive comes two weeks after Colonial Pipeline, which operates the biggest gasoline conduit to the East Coast, was forced to shut down its 5,500-mile pipeline after a devastating ransomware attack.
Top Threat Detections Can Identify Suspicious Activity
Here’s an understatement: the cloud has changed everything. Another one: Microsoft is a target of threat actors. So, it seems to track that 71% of users have suffered an account takeover of a legitimate user’s account, on average, seven times in the year prior, according to an ebook recently released by Vectra.ai.
Conti Ransomware Attacks Impact Healthcare and First Responder Networks
The FBI identified at least 16 Conti ransomware attacks targeting U.S. healthcare and first responder networks, including law enforcement agencies, emergency medical services, 9-1-1 dispatch centers, and municipalities within the last year. These healthcare and first responder networks are among the more than 400 organizations worldwide victimized by Conti, over 290 of which are located in the U.S.
Cybersecurity Regs for Pipelines Reportedly Coming Soon
The U.S. Department of Homeland Security is preparing cybersecurity regulations for the oil and gas industry in the wake of the ransomware attack on Colonial Pipeline Co. that resulted in the company suspending operations for several days, according to The Washington Post.
DHS Directive Will Compel Pipeline Companies to Report Cyberattacks
The U.S. Department of Homeland Security is preparing to issue a directive that will require all pipeline companies to report cybersecurity incidents following the ransomware attack on Colonial Pipeline Co. earlier this month.
Vectra and Zscaler Enable Zero Trust Visibility into Business-Critical Applications
Vectra, a leader in threat detection and response, today announced a deep product integration with Zscaler Private Access™ (ZPA) to provide end-to-end access visibility and protection from remote workers to business-critical applications.
Right data and meaningful ai critical to cybersecurity
The cloud has changed everything we know about security. With the rapid deployment of the cloud during a global crisis, cyber threats also have continued to evolve, prompting businesses to place greater emphasis on protecting their data and applications.
Vectra identifies top 10 threat detections across Azure AD and Office 365
New security research from Vectra shows how security teams can avoid costly cyberattacks by utilizing the right data and meaningful artificial intelligence.
Should Paying Ransoms to Attackers Be Banned?
Insurance company CNA's apparent decision to pay attackers a $40 million ransom and Colonial Pipeline Co.'s payment of a $4.4 million ransom are stirring debate over whether such payments should be banned under federal law.