Cuba Ransomware Nets Nearly $50m

Cuba Ransomware Nets Nearly m

The threat actors behind the Cuba ransomware variant have already amassed $44m through targeting of at least 49 victims, according to the FBI. The bureau’s latest ‘flash’ alert revealed that the group had demanded at least $74m from its victims. These victims frequently come from critical infrastructure sectors like financial, government, healthcare, manufacturing, and IT. “Cuba ransomware is distributed through Hancitor malware, a loader known for dropping or executing stealers, such as Remote Access Trojans (RATs) and…

Read More

How wireless WAN can make SD-WAN more agile and resilient

How wireless WAN can make SD-WAN more agile and resilient

Wireless WAN has begun to rise in availability and utility, and to improve in affordability. It brings wide-area connectivity to just about any physical space and can hit speeds far in excess of older single or multiple T1 links and DSL. It has its challenges to be sure, and the biggest ones are centered on the business model. It is hard to get a WWAN connection priced the same way a wired connection is: paying…

Read More

State Department Phones Hijacked by Spyware

State Department Phones Hijacked by Spyware

Nine US State Department officials had their iPhones remotely hacked by spyware from controversial firm NSO Group, according to reports. Four people familiar with the matter told Reuters that the Israel developer’s Pegasus malware was used to snoop on the US government victims over the past few months. Although the identity of the hacker(s) is unknown, the targeted staffers were either based in Uganda or working on projects concerning the African country. They were apparently…

Read More

Romance Fraudster Targeted 670 Women Online

Romance Fraudster Targeted 670 Women Online

A romance fraudster who targeted hundreds of women online has pleaded guilty to charges of fraud and money laundering. Osagie Aigbonohan, 40, from Lagos, Nigeria, is currently awaiting sentencing after appearing before Southwark Crown Court on Friday. His scams are said to have tricked at least nine victims he befriended on dating sites into sending him money, including one woman who was conned out of nearly £10,000. That victim made nine payments over the course…

Read More

Dell Technologies takes a holistic, risk-based approach to build resilience

Dell Technologies takes a holistic, risk-based approach to build resilience

Dell Technologies takes a holistic, risk-based approach to build resilience | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Cognizant’s Global Business Resilience team leads crisis management

Cognizant’s Global Business Resilience team leads crisis management

Cognizant’s Global Business Resilience team leads crisis management | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

5 minutes with Teresa Shea: Avoiding cyberattacks

5 minutes with Teresa Shea: Avoiding cyberattacks

5 minutes with Teresa Shea: Avoiding cyber attacks | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

The New “Attack Surface” – Securing Beyond Conventional Boundaries

The New “Attack Surface” – Securing Beyond Conventional Boundaries

In 2020, just under half the UK workforce worked from home at least some of the time, according to the Office of National Statistics. In the United States, a survey by Upwork found that over a quarter of professionals expect to work fully remotely within the next five years. Working from home has been propelled into the mainstream by the COVID-19 pandemic as well as the resulting lockdowns and restrictions on traveling to work. But…

Read More

December 2021: Cyber Deception Month

December 2021:  Cyber Deception Month

How Bad Are The Breaches? Please take the time to visit a visual mapping of the largest breaches… http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ Which I shortened for you… https://tinyurl.com/CDMG-DEC-2021  (you can trust me, I’m a CISSP and the Publisher of this Magazine in our 10th Anniversary) also… https://tinyurl.com/breaches2021  your choice.  Feel free to test these two URLs in VirusTotal but be warned, antivirus – even next gen AV cannot stop these breaches from happening. BILLIONS OF RECORDS, SO FAR……

Read More

The 3 Drivers of Zero Trust Network Access Implementation

The 3 Drivers of Zero Trust Network Access Implementation

It’s human nature to put off tasks that aren’t urgent. Whether it’s planning that never ends or simple procrastination, it’s easy to let timelines slip until an external force lights a fire under the project. At many organizations, that’s what’s happened with Zero Trust Network Access (ZTNA). The zero-trust security model has been around for a long time now and it’s well understood that it improves security because it forces ongoing verification of users and…

Read More
1 3,154 3,155 3,156 3,157 3,158 3,817