Ransomware Actors Embrace Intermittent Encryption

Ransomware Actors Embrace Intermittent Encryption

Threat actors are increasingly turning to a new encryption method in their ransomware attacks, designed to improve success rates, according to SentinelOne. SentinelLabs researchers Aleksandar Milenkoski and Jim Walter wrote in a new blog post that “intermittent encryption” is being heavily advertised to buyers and affiliates. Its primary advantages over more traditional methods of ransomware encryption are speed and its ability to evade threat detection tools. By only partially encrypting victims’ files, threat actors can cause…

Read More

ICO Slams Government Departments Over FOI Failings

ICO Slams Government Departments Over FOI Failings

The Information Commissioner’s Office (ICO) has taken action against two government departments for “persistent” failures to respond to Freedom of Information (FOI) Act requests. The Department for International Trade (DIT) was issued with an enforcement action notice while the Department for Business, Energy and Industrial Strategy (BEIS) was handed a practice recommendation after they failed to respond to FOI requests in time. From January to March 2022, the DIT issued late responses to over 50%…

Read More

North Korean Lazarus Group Hacked Energy Providers Worldwide

North Korean Lazarus Group Hacked Energy Providers Worldwide

A malicious campaign conducted by the North Korean threat actor Lazarus Group targeted energy providers around the world between February and July 2022. The campaign was previously partially disclosed by Symantec and AhnLab in April and May, respectively, but Cisco Talos is now providing more details about it. Writing in an advisory on Thursday, the security researchers said the Lazarus campaign involved the exploitation of vulnerabilities in VMWare Horizon to gain initial access to targeted organizations….

Read More

Data Classification: How to Correctly Classify Your Data in 2022

Data Classification: How to Correctly Classify Your Data in 2022

Data classification can feel like an overwhelming task, especially for organizations without a strong practice in place. As with any security approach, data classification is both crucial and tempting to avoid. Regardless of whether the value is recognized, there’s a chance that it gets pushed further and further down the priority list in favor of items that are easier to address. In this article, we’ll help you build a case for data classification and fill…

Read More

Security Culture: The ClubCISO report reveals a fundamental shift

Security Culture: The ClubCISO report reveals a fundamental shift

With business and technology becoming increasingly intertwined, organizations are being forced to rethink how they look at digital security. Once overlooked or viewed as a mere afterthought, today it has become a business-critical necessity. As a result, organizations across industry lines are racing to improve their security postures. Chief Information Security Officers (CISOs) are at the core of this transformation, spearheading a wave of proactive and future-forward cybersecurity change while enabling security-first innovation. The latest…

Read More

How to sell IT services to the Canadian government

How to sell IT services to the Canadian government

Twenty-two billion dollars: that’s the value of goods and services the Canadian federal government buys every year from the private sector – including IT goods and services. It’s money that can be earned by IT firms willing to take the time and effort to participate in the federal procurement process. “The federal government has a robust, rules-based procurement system,” says Howard Mains, Managing Principal of Tactix, a procurement advisory firm in Ottawa, Ontario. “Under various…

Read More

Security Breaks: TeamTNT’s DockerHub Credentials Leak

Security Breaks: TeamTNT’s DockerHub Credentials Leak

We constantly deploy and study our honeypots to get a view of actively exploited vulnerabilities and misconfigurations on platforms and services that pose cloud security risks. One of these honeypots is based on exposed Docker REST API for analysis from cloud services providers’ and users’ perspectives. Upon analyzing the samples, we realized and were able to understand the threat actors’ use of container registry features for Docker malware and tactics, techniques, and procedures (TTPs). Our…

Read More

Leading a Revolution to Provide Secure CCTV Cameras

Leading a Revolution to Provide Secure CCTV Cameras

By Mitch Muro, Product Marketing Manager, Check Point Software Technologies When building IoT devices, it is important to understand that an IoT device (by default) is rarely secure. This is due to the simple fact that these devices are often designed to increase productivity and provide immediate value to its customers, leaving security as an afterthought (or completely out of the equation). It is unsafe to assume that skipping the step of implementing security is…

Read More
1 2,754 2,755 2,756 2,757 2,758 4,136