Crypting Mastermind Gets Just Two Years for Kelihos Plot

Crypting Mastermind Gets Just Two Years for Kelihos Plot

A Russian man has been sentenced to just 24 months behind bars for his part in helping to hide the infamous Kelihos malware from global security teams. Oleg Koshkin, 41, was convicted by a federal jury on June 15 of one count of conspiracy to commit computer fraud and abuse, and one count of computer fraud and abuse. He’s said to have operated several crypting websites including “crypt4u.com” and “fud.bz.” Crypting services are used by…

Read More

Three-Quarters of Firms Admit to Sub-Optimal IoT Security

Three-Quarters of Firms Admit to Sub-Optimal IoT Security

Global businesses have become more risk aware as they deploy IoT projects, but over three-quarters (77%) admitted that these systems could be more secure, according to Inmarsat. The satellite communications company polled 450 individuals responsible for delivering IoT in their respective organizations around the world, to compile its report, Industrial IoT in the Time of COVID-19. The most commonly cited security challenges were an external cyber-attack on IoT systems (50%), poor network security (49%), insecure…

Read More

Security solutions roundup 2021

Security solutions roundup 2021

Security solutions roundup 2021 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this…

Read More

Body-worn video camera use extends beyond policing

Body-worn video camera use extends beyond policing

Body-worn video camera use extends beyond policing | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Australia Leads with Controversial Cyber Laws | The State of Security

Australia Leads with Controversial Cyber Laws | The State of Security

The Australian government is looking to pass the Security Legislation Amendment (Critical Infrastructure) Bill 2020, an overhaul which is aimed to help Australian businesses fend off cyberattacks. The Bill expands the business sectors that were previously defined as critical infrastructure by adding, amongst others, Food and Grocery, Finance and Banking, Universities, Communications, Defense, Energy, and Transportation to the list. It would also impose strict 12-hour reporting requirements for cyberattacks as well as allow the Australian…

Read More

This Week in Security News – December 10, 2021

This Week in Security News – December 10, 2021

Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, read about Trend Micro’s predictions for security in the coming year. Also, learn about the Biden administration’s latest initiatives for curtailing attacks on the transport infrastructure. Read on: Pushing Forward Key Takeaways from Trend Micro’s Security Predictions for 2022 Because of the Covid-19 pandemic, organizations have learned to…

Read More

New Yanluowang Ransomware Found to be Code-Signed, Terminates Database-Related Processes

New Yanluowang Ransomware Found to be Code-Signed, Terminates Database-Related Processes

New Yanluowang Ransomware Found to be Code-Signed, Terminates Database-Related Processes Ransomware We analyzed new samples of the Yanluowang ransomware. One interesting aspect of these samples is that the files are code-signed. They also terminate various processes which are related to database and backup management. By: Don Ovid Ladores December 10, 2021 Read time:  ( words) We analyzed new samples of the Yanluowang ransomware, a recently discovered ransomware family. One interesting aspect of these samples is…

Read More

How Zero Trust and XDR Work Together

How Zero Trust and XDR Work Together

XDR alone is an effective security capability. However, when used in tandem with the Zero Trust approach, organizations can further enhance their security. XDR has two significant assets that can support a Zero Trust strategy: strong endpoint (user, cloud workload, device, etc) controls and organization-wide data collection and correlation from across the IT infrastructure. Here’s how it works: Strong endpoint controls deliver a solid foundation for verifying and establishing trust by providing security teams with…

Read More

Six Unexpected Challenges to Modernizing Apps

Six Unexpected Challenges to Modernizing Apps

App modernization brings undeniable benefits such as reduced costs, improved productivity, increased business agility, and enhanced security. Staying competitive and delivering value to your customers requires a trusted foundation to accelerate innovation, and it’s likely that your application future may consist of cloud-based, containerized, microservice-based applications created to run with DevOps processes.  While your organization may have a well-defined vision, the path to achieve it can be unclear. The most common approach is to attempt to shift into that future state in “one fell swoop” — swapping out the entire infrastructure stack all in one go instead of evolving current teams and processes. With this approach, there are huge technical,…

Read More

US IT job recovery is in full swing, but employee retention can be tenuous

US IT job recovery is in full swing, but employee retention can be tenuous

Hiring of IT professionals is at record pace with 197,000 more IT jobs so far this year than at the same time last year, according to the US Bureau of Labor Statistics (BLS). There has been growth in the IT job market each of the past eight months, according to IT employment consultancy Janco Associates.  “Information-Technology leaders say they are boosting compensation packages and flexible work options to widen the pool of prospective job candidates,…

Read More
1 3,289 3,290 3,291 3,292 3,293 3,969