Ransomware: Why These Attacks Continue to Cause Cyber Risk
Since taking office in January, the Biden administration has made cybersecurity one of its top priorities.
Right place, right time: machine learning in cyber incident response
Why it’s important to make the most of machine learning when managing cyber-security incidents.
Ransomware's Evolution: 6 Key Trends to Watch
As security teams start to fight back, attackers have only become more sophisticated. Here are six key trends that your security team should be tracking to ensure that your organization remains cyber resilient.
Acer confirms new attack on servers
Acer has confirmed that its servers in Taiwan have also been breached, after hackers themselves shared details about the incident with privacy watchdogs, Privacy Affairs.
30 Mins or Less: Rapid Attacks Extort Orgs Without Ransomware
The previously unknown SnapMC group exploits unpatched VPNs and webserver apps to breach systems and carry out quick-hit extortion in less time than it takes to order a pizza.
Ransom Disclosure Act Would Require Victims to Disclose Ransom Payments Within 48 Hours
A new bill introduced would require ransomware victims to disclose ransom payments within 48 hours of payment — including the amount of ransom demanded and paid the type of currency used for payment of the ransom, and any known information about the entity demanding the ransom.
Successfully Influencing Employee Security Behavior
A new report from Forrester Research indicates organizations should tread carefully between engagement, empathy and punishment because punishment has the tendency to reinforce employees’ negative perceptions and resentment of the security team.
New Twist on DDoS Technique Poses Threat to CSP Networks
No Internet-connected device appears to be safe from potentially being abused by a newly theorized form of distributed denial of service attack.
Illinois Man Ran Business Telling Clients How to Launch Computer Attacks: DOJ
An Illinois man ran a successful computer takedown service until the feds stepped in.
Why AI is a Critical Weapon in the War on Ransomware
In the sprawling IT landscapes of today, artificial intelligence (AI) will play a decisive role in this war against ransomware, giving organizations the best chance to defeat motivated attackers.
What Is the Difference Between Security and Resilience?
Vectra Technical Director to the CTO Office, Tim Wade explains how Resilience shifts the focus toward eliminating the probable impact of the full attack chain.
Use AI to beat the bad guys
Vectra CEO, Hitesh Sheth explains how AI is the greatest ally when it comes to creating a secure future. AI can learn the differences between normal and malicious activity — independently, without requiring human input.
How Superloop Reduced False Positives with Behavioural Threat Detection
The security team at the Australian telco got its network detection response down from four hours down to one hour a day.
Half of On-Prem Databases Contain Security Vulnerabilities
Organizations aren’t maintaining regular patching: With nearly half of all databases globally (46%) containing a vulnerability and the average number of Common Vulnerabilities and Exposures (CVEs) per database standing at 26, it’s clear that businesses are ignoring one of the basic tenets of data security which is to patch and update databases as soon and often as possible.
Executives' Ransomware Concerns are High, Yet Few are Prepared for Attacks
One out of every two on-premises databases globally has at least one vulnerability, finds a new study.
Wake-up call required to defend APAC’s critical national infrastructure
Chris Fisher, our Director of Security Engineering APJ, discusses how public and private sector organisations – from government and military to banking, energy and transportation – have become digital-centric to seek economic savings, productivity gains and to create customer and citizen value.
Cybercrime Money Launderer Handed 11-Year Sentence
A dual U.S.-Canadian national has been sentenced to more than 11 years in federal prison for conspiring to launder tens of millions of dollars in wire and bank fraud schemes, according to the U.S. Department of Justice. Officials say the activity included cash-out scams for North Korean hackers, including the criminal gang Lazarus Group, which has been associated with a military unit for the authoritarian regime.
REvil Ransomware Group Resurfaces After Two Months Away
It was a short hiatus for the REvil ransomware group that signed off in July following several high-profile attacks by the Russia-based crew on such companies as global meat processor JBS and tech services provider Kaseya.
Protecting Asia Pacific’s supply chain from cyber risk
Over the course of the pandemic, one of the biggest disruptions the world faced was to critical national infrastructure, specifically supply chains. Border and port closures, mandated work from home policies, and severe shortages of citizen essential products including PPE and pharmaceuticals, have highlighted vulnerabilities in production, supply, and logistics. Asia is now experiencing a renewed surge in Covid-19 infections, which continues to impact supply chains across the world and manufacturers are yet again faced with complexities.
NTFS Support in New Linux Kernel Promises to Make New Release More Cryptographically Sound
Based on industry reports over the past few days, it appears that Paragon Software will include its New Technology File System 3 (NTFS3) kernel driver in the recent Linux Kernel 5.15 release, which promises improved support for Microsoft's NTFS file system.
Is having many partners always better?
Microsoft has a sizeable global channel that raises the question of whether that is the model that all vendors should be aspiring to follow.
DHS Announces Two Senior Cybersecurity Appointments
The United States Department of Homeland Security (DHS) has announced two senior cybersecurity appointments.
DHS Announces David Larrimore as CTO
David Larrimore has been named chief technology officer for DHS, a role he previously held at Immigration and Customs Enforcement between 2016 and 2019. Between federal appointments, Larrimore was lead solution engineer at Salesforce.
Behind the Firewall: What to Do if Your Vendor Has a Security Incident
A vendor with a checkered security incident past is not automatically disqualified from future contracts. Rather, there is a playbook for due diligence.
LockFile Ransomware Using New Techniques to Evade Detection
The operators of LockFile ransomware have adopted new techniques, including "intermittent encryption," to help evade detection, according to cybersecurity firm Sophos.