Sophos Links Mount Locker to Astro Locker Ransomware

Sophos Links Mount Locker to Astro Locker Ransomware

Security experts have uncovered a series of close links between ransomware groups Mount Locker and Astro Locker Team, in a new report that will be of interest to incident responders. Sophos’ Managed Threat Response (MTR) team said it recently dealt with an attack that had all the TTPs of a Mount Locker operation. However, when it followed the link in the ransom note, the researchers were met by a ‘support’ team who introduced themselves as “Astro…

Read More

US IT jobs have regained what they lost in the pandemic

US IT jobs have regained what they lost in the pandemic

Nearly all the US IT jobs lost in 2020 during the COVID-19 pandemic have come back, with IT employment enjoying eight straight months of growth. Of course, some of the replacement jobs were in IT specialties other than the jobs lost, as there has been a steady trend of declining data center and telecommunications positions in favor of software development jobs; that was true, even before the pandemic. At its worst, more than 100,000 IT…

Read More

CISA: Patch These Three Fortinet Bugs Now to Avoid Compromise

CISA: Patch These Three Fortinet Bugs Now to Avoid Compromise

The US authorities are urging Fortinet customers to patch three legacy vulnerabilities being exploited in the wild to compromise government, commercial and technology service provider networks. A joint cybersecurity advisory from the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) on Friday warned that threat actors are actively scanning for devices via ports 4443, 8443 and 10443, with the potential end goals of data theft or ransomware deployment. “The FBI and CISA believe the APT actors…

Read More

LinkedIn Users Targeted by Spear-Phishing Campaign

LinkedIn Users Targeted by Spear-Phishing Campaign

Security researchers are warning LinkedIn users to beware of unsolicited job offers after revealing a new spear-phishing campaign designed to install Trojan malware on their devices. The eSentire Threat Response Unit (TRU) yesterday claimed that individuals were being targeted with customized files named the same as their own current role. “Upon opening the fake job offer, the victim unwittingly initiates the stealthy installation of the fileless backdoor, more_eggs. Once loaded, the sophisticated backdoor can download…

Read More

When it comes to insider risk, not all employees are equal

When it comes to insider risk, not all employees are equal

When it comes to insider risk, not all employees are equal | 2021-04-06 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

The new rules of security: How AI will transform video surveillance

The new rules of security: How AI will transform video surveillance

The new rules of security: How AI will transform video surveillance | 2021-04-06 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

What’s the failsafe alternative to FireEye and SolarWinds?

What’s the failsafe alternative to FireEye and SolarWinds?

What’s the failsafe alternative to FireEye and SolarWinds? | 2021-04-06 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

3 Best Practices for Building Secure Container Images

3 Best Practices for Building Secure Container Images

Organizations are increasingly turning to containers to fuel their digital transformations. According to BMC, a 2019 survey found that more than 87% of respondents were running containers—up from 55% just two years earlier. Additionally, 90% of survey participants that were running applications in containers were doing so in production. That was up from 84% in 2018 and two-thirds of surveyed IT professionals a year before that. The Benefits and Challenges of Containers According to Kubernetes’…

Read More

Industrial IoT Standards Need to Catch Up to Consumer IoT

Industrial IoT Standards Need to Catch Up to Consumer IoT

When it comes to cybersecurity, industrial IT—consisting mainly of operational technology (OT) and industrial control systems (ICS)—has failed to keep up with development in the enterprise IT world. That’s mostly because industries’ adoption of internet technology has been slower when compared with enterprises. It would take some time to close the gap, but concerted efforts have already been made to upgrade the security of industrial IT and improve the efficiency of OT and ICS. These…

Read More

Immersion cooling firm LiquidStack launches as a stand-alone company

Immersion cooling firm LiquidStack launches as a stand-alone company

Ever since Bitcoin was introduced back in 2009, this cryptocurrency has had the distinction of being something you could mine with your computer—putting your hardware to use helping the blockchain technology Bitcoin is based on record and verify transactions by solving complex math problems. As a reward, you’d get Bitcoins. But it was a very slow process for a single PC, and the necessary component for success was a high-end GPU. One GPU brought to…

Read More
1 3,453 3,454 3,455 3,456 3,457 3,549