Attackers Increasingly Turning to DDoS as a Ransom Vector

Attackers Increasingly Turning to DDoS as a Ransom Vector

Nearly half (44%) of organizations have been targeted or fallen victim to a ransom-related distributed denial of service (RDDoS) attack in the past 12 months, according to a survey of 313 cybersecurity professionals by the Neustar International Security Council (NISC). Interestingly, during the same period, a lower proportion (41%) of organizations were targeted by a ransomware attack, suggesting cyber-criminals are increasingly using DDoS attacks as a means of extorting money from victims. Rodney Joffe, chairman of…

Read More

Palo Alto Networks Achieves FedRAMP Authorization for Prisma Access Cloud-Delivered Security

Palo Alto Networks Achieves FedRAMP Authorization for Prisma Access Cloud-Delivered Security

SANTA CLARA, Calif., Aug. 12, 2021 /PRNewswire/ — Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today announced that Prisma® Access has achieved Federal Risk and Authorization Management Program (FedRAMP) Moderate Authorization. With this authorization, Prisma Access can help U.S. government agencies secure their distributed workforce. As the COVID-19 pandemic has changed the way we work, there has never been a greater need for U.S. government agencies to have consistent, secure connectivity for remote…

Read More

Accenture Tied Up in $50M Ransom Lockbit 2.0 Attack

Accenture Tied Up in M Ransom Lockbit 2.0 Attack

Global consulting firm Accenture has been the target of ransomware group Lockbit, with the gang reportedly taking encrypted data from the company. Lockbit says it will publish the data if Accenture does not pay the ransom, according to screenshots of the ransomware group’s website. Infosecurity has asked Accenture for a comment on the ransomware attack. In a statement provided to CNN, an Accenture spokesperson told the international outlet., “Through our security controls and protocols, we…

Read More

How pipeline owners & operators can fulfill the TSA’s 2nd security directive

How pipeline owners & operators can fulfill the TSA’s 2nd security directive

Back in June, I wrote about the Transportation Security Agency’s (TSA) new security directive concerning pipeline owners and operators. The order mandated those entities to disclose security incidents such as the ransomware attack that affected the Colonial Pipeline Company back in May to the TSA and the Cybersecurity & Infrastructure Security Agency (CISA). It also required pipeline owners and operators to review their current practices, designate someone like a Chief Information Security Officer (CISO) as…

Read More

NCSC Launches Microsoft Office 365 Button to Report Business Email Spam

NCSC Launches Microsoft Office 365 Button to Report Business Email Spam

UK employees can now use one single click to flag scam emails to the National Cyber Security Centre (NCSC), with the organization already receiving 6.5 million reports from the public since its original launch. Launched today, the NCSC says it has made it easier than ever for employees in the UK to join the fightback against email scams targeting their organizations. Guidance has been published on how IT administrators can add a new reporting tool…

Read More

Smartsearch Finds 10% Of Regulated Businesses Do No Checks on Business Customers

Smartsearch Finds 10% Of Regulated Businesses Do No Checks on Business Customers

A regulatory technology (RegTech) company has launched a new campaign to encourage UK organizations to ditch manual “outdated” identification and verification methods for regulated businesses. SmartSearch, based in West Yorkshire, UK, launched its Electronic Verification Uncovered campaign to raise awareness of the dangers of manual ID checks. As part of the campaign, it has published its SmartSearch Index report, conducted by 3Gem Market Research, to highlight the ongoing threat of money laundering in the UK….

Read More

DHS partners with Girl Scouts to launch cyber awareness challenge

DHS partners with Girl Scouts to launch cyber awareness challenge

DHS partners with Girl Scouts to launch cyber awareness challenge | 2021-08-12 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Best practices ahead of severe weather season

Best practices ahead of severe weather season

Best practices ahead of severe weather season | 2021-08-12 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

How to Secure Hybrid Teams Against Insider Threats

How to Secure Hybrid Teams Against Insider Threats

As businesses emerge from the pandemic, many are making strategic decisions about their long-term work arrangements. While there is a substantial debate about remaining remote or bringing people back to the office, many companies are choosing to meet in the middle, embracing a hybrid work arrangement that allows people to work both on-site and remotely. According to a Gartner survey of industry leaders across representative sectors, 82% of companies plan to provide a remote work…

Read More

The Next Disruptive ICS Attacker: A Ransomware Gang?

The Next Disruptive ICS Attacker: A Ransomware Gang?

OT networks often rely on Windows systems for various ICS applications including HMIs, historians, and data gateways. Beyond that, they also commonly rely on Windows systems to run associated IT-networks. A successful ransomware deployment into either of these networks may prevent engineers from controlling plant operations and lead to an unplanned shutdown. This creates an immediate cost on the organization due to lost productivity. In the worst case, unplanned shutdowns may lead to physical failures…

Read More
1 2,151 2,152 2,153 2,154 2,155 2,593