Cisco Talos reports new variant of Babuk ransomware targeting Exchange servers

Cisco Talos reports new variant of Babuk ransomware targeting Exchange servers

A new bad actor called Tortilla is running the campaign, and most affected users are in the U.S. Cisco Talos recently discovered a malicious campaign deploying variants of the Babuk ransomware via an unusual infection chain technique. Image: Cicso Talos Cisco Talos has a warning out for U.S. companies about a new variant of the Babuk ransomware. The security researchers discovered the campaign in mid-October and think that the variant has been active since July…

Read More

US House Passes Acts to Help SMBs with Cybersecurity

US House Passes Acts to Help SMBs with Cybersecurity

The United States House of Representatives has passed two bills to strengthen the cybersecurity of small businesses.  The Small Business Development Center Cyber Training Act of 2021 attracted strong support among House members of all political persuasions and was passed on Tuesday with a vote of 409 in favor to 14 against.  Representative Andrew Garbarino, who is both a member of the Small Business Committee and a ranking member of the Committee on Homeland Security’s Subcommittee on…

Read More

Data and the policies that protect it: 4 essential plans to have in place

Data and the policies that protect it: 4 essential plans to have in place

These four sample policies can help you protect your data by ensuring it’s properly encrypted, stored safely, only accessible by certain people, and securely backed up. Image: Andriy Onufriyenko / Getty Images It’s been said we’ve gone beyond the information age and into the experience age, imagination age, fourth industrial revolution or one of a dozen other names for our current technological era. It doesn’t matter what we call it, the underpinning of it all…

Read More

Trojan Source attack method allows hiding flaws in source code

Trojan Source attack method allows hiding flaws in source code

Researchers devised a new attack method called ‘Trojan Source’ that allows hide vulnerabilities into the source code of a software project. Trojan Source is a new attack technique demonstrated by a group of Cambridge researchers that can allow threat actors to hide vulnerabilities in the source code of a software project. The technique could be exploited to inject stealth malware without impacting the semantics of the source code while changing its logic. “We present a…

Read More

Aruba SD-WAN Accelerates Cloud On-ramp Access to Google Cloud and Network Connectivity Center

Aruba SD-WAN Accelerates Cloud On-ramp Access to Google Cloud and Network Connectivity Center

The consequence of the global pandemic exacerbated the importance of accelerating cloud and digital transformation, resulting in more than 90 percent of enterprises purporting to now have a multi-cloud strategy in place, according to the Flexera 2020 State of the Cloud Report. As enterprises accelerate their transformation to a cloud-first strategy, IT teams have to manage the complexity of connecting resources across on-prem locations and the cloud to ensure access to all workloads from anywhere….

Read More

BlackMatter ransomware gang allegedly disbanding due to pressure from authorities

BlackMatter ransomware gang allegedly disbanding due to pressure from authorities

Operators of the ransomware-as-a-service group are claiming that the project is closed and that their entire infrastructure will be turned off. Image: jijomathaidesigners/Shutterstock The BlackMatter ransomware group is reportedly closing up shop due to pressure from law enforcement officials. A Wednesday Twitter post from malware researcher VX-Underground broke the news with a screenshot of a statement apparently from BlackMatter operators. Roughly translated from Russian into English, the statement reads as follows: “Due to certain unsolvable…

Read More

Pink Botnet infected over 1.6 Million Devices, it is one of the largest botnet ever seen

Pink Botnet infected over 1.6 Million Devices, it is one of the largest botnet ever seen

Cybersecurity researchers uncovered a huge botnet, tracked as Pink, that already infected over 1.6 million devices most of them located in China. Qihoo 360’s Netlab Cybersecurity researchers discovered a huge botnet, tracked as Pink, that already infected over 1.6 million devices. The botnet was created to launch DDoS attacks and to insert advertisements in the legitimate HTTP traffic of the victims, most of which are in China (96%). According to the experts, Pink is the…

Read More

5 Recommendations to Prevent Man in the Middle Attacks (MITMA’s) within the Financial Sector.

5 Recommendations to Prevent Man in the Middle Attacks (MITMA’s) within the Financial Sector.

MITMA’s stands for Man in The Middle Attacks, and is the term used to describe one the oldest but still exceptionally popular forms of attack. In this attack, a hacker intercepts an unsecure wireless connection, and places themselves between two computers/devices that are in communication with one another. Once the hacker is on the network, the attacker then impersonates both sides to steal information and sensitive data, to hijack emails, SSL hijack, eavesdrop into conversations….

Read More

7 out of 10 IT employees may quit their jobs

7 out of 10 IT employees may quit their jobs

7 out of 10 IT employees may quit their jobs | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Turkish resort adds radar cameras and guards to improve safety

Turkish resort adds radar cameras and guards to improve safety

Turkish resort adds radar cameras and guards to improve safety | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More
1 3,208 3,209 3,210 3,211 3,212 3,795